Abstract-- The growth of wireless network use has greatly increased research demand. Some applications, which are contextaware, must adapt to the environment. So, information on bo...
Jeandro Bezerra, Rudy Braquehais, Filipe Roberto, ...
We consider a distributed information system that allows autonomous consumers to query autonomous providers. We focus on the problem of query allocation from a new point of view, ...
The increasing use of distributed authentication architecture has made interoperability of systems an important issue. Interoperability of systems reflects the maturity of the tech...
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Electronic Governance (e-Governance) has received a tremendous interest world over. Significant amount of money is being put into making e-Governance a reality. A number of Projec...
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
This paper explains how semantic frameworks can be used to support successful e-Government initiatives by connecting system design to a shared understanding of interactions and pr...
Charles Crichton, Jim Davies, Jeremy Gibbons, Stev...
The paper analyses existing open source licenses with the aim of choosing a license that is suitable for e-Governance projects. A method is presented for systematically choosing t...