Sciweavers

131 search results - page 15 / 27
» Web services access control architecture incorporating trust
Sort
View
WWW
2008
ACM
14 years 7 months ago
Privacy-enhanced sharing of personal content on the web
Publishing personal content on the web is gaining increased popularity with dramatic growth in social networking websites, and availability of cheap personal domain names and host...
Mohammad Mannan, Paul C. van Oorschot
ICSNW
2004
Springer
238views Database» more  ICSNW 2004»
14 years 3 days ago
Knowledge Sifter: Agent-Based Ontology-Driven Search over Heterogeneous Databases Using Semantic Web Services
Knowledge Sifter is a scaleable agent-based system that supports access to heterogeneous information sources such as the Web, open-source repositories, XML-databases and the emergi...
Larry Kerschberg, Mizan Chowdhury, Alberto Damiano...
SRDS
2006
IEEE
14 years 22 days ago
WRAPS: Denial-of-Service Defense through Web Referrals
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
XiaoFeng Wang, Michael K. Reiter
AISS
2010
131views more  AISS 2010»
13 years 4 months ago
LWSDM: Layered Web Service Discovery Mechanism
The boom of Service oriented architecture is on substantial rise. SOA developers orchestrate individual SOA objects into web services. It has been a dream of software engineers to...
Shrabani Mallick, D. S. Kushwaha
SOSP
2003
ACM
14 years 3 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz