Sciweavers

865 search results - page 106 / 173
» A Secure Information Flow Architecture for Web Services
Sort
View
WWW
2008
ACM
16 years 15 days ago
Web people search: results of the first evaluation and the plan for the second
This paper presents the motivation, resources and results for the first Web People Search task, which was organized as part of the SemEval-2007 evaluation exercise. Also, we will ...
Javier Artiles, Satoshi Sekine, Julio Gonzalo
WWW
2007
ACM
16 years 15 days ago
Analyzing web access control policies
XACML has emerged as a popular access control language on the Web, but because of its rich expressiveness, it has proved difficult to analyze in an automated fashion. In this pape...
Vladimir Kolovski, James A. Hendler, Bijan Parsia
IADIS
2003
15 years 1 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson
WWW
2007
ACM
16 years 15 days ago
Spam double-funnel: connecting web spammers with advertisers
Spammers use questionable search engine optimization (SEO) techniques to promote their spam links into top search results. In this paper, we focus on one prevalent type of spam ? ...
Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
COOPIS
2004
IEEE
15 years 3 months ago
GRIDKIT: Pluggable Overlay Networks for Grid Computing
A `second generation' approach to the provision of Grid middleware is now emerging which is built on service-oriented architecture and web services standards and technologies....
Paul Grace, Geoff Coulson, Gordon S. Blair, Lauren...