Sciweavers

352 search results - page 41 / 71
» Accessing X Applications over the World-Wide Web
Sort
View
DEXAW
1998
IEEE
94views Database» more  DEXAW 1998»
15 years 4 months ago
Towards Access Control for Logical Document Structures
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Fredj Dridi, Gustaf Neumann
SOSP
1997
ACM
15 years 1 months ago
Application Performance and Flexibility on Exokernel Systems
The exokernel operating system architecture safely gives untrusted software efficient control over hardware and software resources by separating management from protection. This ...
M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ga...
IAJIT
2010
133views more  IAJIT 2010»
14 years 10 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
CIKM
2011
Springer
13 years 11 months ago
Keyword search over RDF graphs
Large knowledge bases consisting of entities and relationships between them have become vital sources of information for many applications. Most of these knowledge bases adopt the...
Shady Elbassuoni, Roi Blanco
WWW
2008
ACM
16 years 15 days ago
Exploring social annotations for information retrieval
Social annotation has gained increasing popularity in many Web-based applications, leading to an emerging research area in text analysis and information retrieval. This paper is c...
Ding Zhou, Jiang Bian, Shuyi Zheng, Hongyuan Zha, ...