Sciweavers

4326 search results - page 700 / 866
» A Model for Process Service Interaction
Sort
View
125
Voted
CSFW
2008
IEEE
15 years 10 months ago
Composition of Password-Based Protocols
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
Stéphanie Delaune, Steve Kremer, Mark Ryan
ICASSP
2008
IEEE
15 years 10 months ago
A game theoretic framework for incentive-based peer-to-peer live-streaming social networks
Multimedia social network analysis is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
KCAP
2005
ACM
15 years 9 months ago
An Approach to Ontology Mapping Negotiation
Ontology mapping negotiation aims to achieve consensus among real-world entities about the process of transforming information between different models (ontologies). This paper de...
Nuno Silva, Paulo Maio, João Rocha
124
Voted
IWQOS
2004
Springer
15 years 8 months ago
Provisioning servers in the application tier for e-commerce systems
Abstract— Server providers that support e-commerce applications as a service to multiple e–commerce websites traditionally use a tiered server architecture. This architecture i...
Daniel A. Villela, Prashant Pradhan, Dan Rubenstei...
122
Voted
SACMAT
2003
ACM
15 years 8 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck