Sciweavers

517 search results - page 84 / 104
» Web service security management using semantic web technique...
Sort
View
133
Voted
WS
2010
ACM
15 years 2 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
188
Voted
HICSS
1999
IEEE
152views Biometrics» more  HICSS 1999»
15 years 8 months ago
Incorporating Semantic Relationships into an Object-Oriented Database System
Semantic relationships, those class-to-class connections that carry inherent support for constraints and various other functionalities, play an important role when building inform...
Li-min Liu, Michael Halper
126
Voted
AAAI
2008
15 years 6 months ago
Existentially Quantified Values for Queries and Updates of Facts in Transaction Logic Programs
In several applications of logic programming and Transaction Logic, such as, planning, trust management and independent Semantic Web Services, an action might produce incomplete f...
Paul Fodor
152
Voted
ICWS
2009
IEEE
15 years 1 months ago
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables
Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation points...
Walid Fdhila, Ustun Yildiz, Claude Godart
107
Voted
CCS
2008
ACM
15 years 5 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell