Sciweavers

517 search results - page 70 / 104
» Web service security management using semantic web technique...
Sort
View
PET
2004
Springer
15 years 9 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
161
Voted
EDOC
2009
IEEE
15 years 7 months ago
Process SEER: A Tool for Semantic Effect Annotation of Business Process Models
A key challenge in devising solutions to a range of problems associated with business process management: process life cycle management, compliance management, enterprise process ...
Kerry Hinge, Aditya K. Ghose, George Koliadis
172
Voted
IEEECIT
2010
IEEE
15 years 1 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
ICDE
2005
IEEE
194views Database» more  ICDE 2005»
16 years 5 months ago
Sentiment Mining in WebFountain
WebFountain is a platform for very large-scale text analytics applications that allows uniform access to a wide variety of sources. It enables the deployment of a variety of docum...
Jeonghee Yi, Wayne Niblack
146
Voted
IPPS
2002
IEEE
15 years 8 months ago
FARM: A Feedback-Based Adaptive Resource Management for Autonomous Hot-Spot Convergence System
Abstract— In this paper, we present a novel and comprehensive resource management solution for the autonomous hot-spot convergence system (AHSCS) that uses sensor web. This solut...
S. Swaminathan, G. Manimaran