Sciweavers

248 search results - page 45 / 50
» Web Services Security: Challenges and Techniques
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 1 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
SAINT
2008
IEEE
14 years 1 months ago
inContext: A Pervasive and Collaborative Working Environment for Emerging Team Forms
The way people collaborate has been changed substantially. Team members are now belonging to different organizations, working on multiple objectives at the same time, frequently c...
Hong Linh Truong, Schahram Dustdar, Dino Baggio, S...
CONEXT
2009
ACM
13 years 8 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
AGTIVE
2007
Springer
14 years 1 months ago
Combining Quality Assurance and Model Transformations in Business-Driven Development
Abstract. Business-driven development is a methodology for developing IT solutions that directly satisfy business requirements. At its core are business processes, which are usuall...
Jana Koehler, Thomas Gschwind, Jochen Malte Kü...
WS
2010
ACM
13 years 5 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel