Sciweavers

517 search results - page 72 / 104
» Web service security management using semantic web technique...
Sort
View
ICWS
2004
IEEE
15 years 5 months ago
Realizability of Conversation Protocols With Message Contents
A conversation protocol is a top-down specification framework which specifies desired global behaviors of a web service composition. In our earlier work [6] we studied the problem...
Xiang Fu, Tevfik Bultan, Jianwen Su
145
Voted
ACSAC
2004
IEEE
15 years 7 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
136
Voted
WWW
2003
ACM
16 years 4 months ago
Text joins in an RDBMS for web data integration
The integration of data produced and collected across autonomous, heterogeneous web services is an increasingly important and challenging problem. Due to the lack of global identi...
Luis Gravano, Panagiotis G. Ipeirotis, Nick Koudas...
BMCBI
2008
140views more  BMCBI 2008»
15 years 3 months ago
GORouter: an RDF model for providing semantic query and inference services for Gene Ontology and its associations
Background: The most renowned biological ontology, Gene Ontology (GO) is widely used for annotations of genes and gene products of different organisms. However, there are shortcom...
Qingwei Xu, Yixiang Shi, Qiang Lu, Guo-qing Zhang,...
130
Voted
SOUPS
2006
ACM
15 years 9 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...