Sciweavers

883 search results - page 129 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
133
Voted
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 4 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ENTCS
2007
140views more  ENTCS 2007»
15 years 15 days ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...
125
Voted
NCA
2003
IEEE
15 years 5 months ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis
63
Voted
GCC
2003
Springer
15 years 5 months ago
Research on Construction of EAI-Oriented Web Service Architecture
Web service based data exchange has been the trend of EAI. We can create Proxies to expose existing systems as web services. There have been some tools that can help users to const...
Xin Peng, Wenyun Zhao, En Ye
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 7 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...