Sciweavers

445 search results - page 59 / 89
» Authorization and Access Control in IRO-DB
Sort
View
IAJIT
2010
133views more  IAJIT 2010»
14 years 8 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
TGC
2005
Springer
15 years 3 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
15 years 3 months ago
Virtual Organizations as Normative Multiagent Systems
In this paper we propose a conceptual model of virtual organizations as normative multiagent systems. The dynamic aspects of virtual organizations are modeled using aspects of spe...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
EDBTW
2004
Springer
15 years 1 months ago
Semantic Web Recommender Systems
Research on recommender systems has primarily addressed centralized scenarios and largely ignored open, decentralized systems where remote information distribution prevails. Absenc...
Cai-Nicolas Ziegler
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
14 years 11 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung