Sciweavers

6844 search results - page 182 / 1369
» Web Service Security
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
13 years 5 months ago
Proof as Composition: An approach for the Large-granularity Web Services Composition
The large-granularity Web services are a new form of Web services. In contrast to the traditional Web services, they often have more interfaces, encapsulate more complex business ...
Yuyu Yin, Ying Li, Jianwei Yin, ShuiGuang Deng
FC
2007
Springer
128views Cryptology» more  FC 2007»
14 years 4 months ago
On Authentication with HMAC and Non-random Properties
Abstract. MAC algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial appli
Christian Rechberger, Vincent Rijmen
JUCS
2008
144views more  JUCS 2008»
13 years 10 months ago
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Abstract: Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial
Christian Rechberger, Vincent Rijmen
ICDE
2008
IEEE
165views Database» more  ICDE 2008»
14 years 4 months ago
Semantic Web and firewall alignment
— Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach...
Simon N. Foley, William M. Fitzgerald
ISI
2008
Springer
13 years 10 months ago
Analyzing content development and visualizing social interactions in Web forum
Web forums provide platforms for any Internet users around the world to communicate with each other and express their opinions. In many of the discussions in Web Forums, it involve...
Christopher C. Yang, Tobun Dorbin Ng