Sciweavers

13913 search results - page 2503 / 2783
» models 2007
Sort
View
133
Voted
OTM
2007
Springer
15 years 10 months ago
Towards Community-Based Evolution of Knowledge-Intensive Systems
Abstract. This article wants to address the need for a research effort and framework that studies and embraces the novel, difficult but crucial issues of adaptation of knowledge r...
Pieter De Leenheer, Robert Meersman
116
Voted
OTM
2007
Springer
15 years 10 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
OTM
2007
Springer
15 years 10 months ago
An Outlook on Semantic Business Process Mining and Monitoring
Semantic Business Process Management (SBPM) has been proposed as an extension of BPM with Semantic Web and Semantic Web Services (SWS) technologies in order to increase and enhance...
Ana Karla Alves de Medeiros, Carlos Pedrinaci, Wil...
153
Voted
PAIRING
2007
Springer
148views Cryptology» more  PAIRING 2007»
15 years 10 months ago
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is c...
Cécile Delerablée, Pascal Paillier, ...
« Prev « First page 2503 / 2783 Last » Next »