Sciweavers

436 search results - page 32 / 88
» Arguing for gaining access to information
Sort
View
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
OTM
2005
Springer
15 years 5 months ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...
ICDE
1997
IEEE
127views Database» more  ICDE 1997»
16 years 1 months ago
A Generic Query-Translation Framework for a Mediator Architecture
A mediator is a domain-speci c tool to support uniform access to multiple heterogeneous information sources and to abstract and combine data from different but related databases t...
Jacques Calmet, Sebastian Jekutsch, Joachim Sch&uu...
SIGCOMM
2010
ACM
15 years 2 days ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
15 years 6 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...