Sciweavers

742 search results - page 76 / 149
» XML and web services security
Sort
View
SEMWEB
2004
Springer
14 years 3 months ago
Inferring Data Transformation Rules to Integrate Semantic Web Services
Abstract. OWL-S allows selecting, composing and invoking Web Serdifferent levels of abstraction: selection uses high level abstract descriptions, invocation uses low level groundi...
Bruce Spencer, Sandy Liu
CORR
2011
Springer
145views Education» more  CORR 2011»
13 years 4 months ago
SLDs for Visualizing Multicolor Elevation Contour Lines in Geo-Spatial Web Applications
— This paper addresses the need for geospatial consumers (either humans or machines) to visualize multicolored elevation contour poly lines with respect their different contour i...
B. G. Kodge, P. S. Hiremath
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 4 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
WWW
2003
ACM
14 years 10 months ago
Piazza: data management infrastructure for semantic web applications
The Semantic Web envisions a World Wide Web in which data is described with rich semantics and applications can pose complex queries. To this point, researchers have defined new l...
Alon Y. Halevy, Zachary G. Ives, Peter Mork, Igor ...
IEEEARES
2010
IEEE
14 years 4 months ago
Secure Monitoring of Service Level Agreements
—Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement1 is an SLA specification that addresses the need of both ...
K. P. Clark, Martijn Warnier, Frances M. T. Brazie...