Sciweavers

4496 search results - page 715 / 900
» DACS Web Service
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 11 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
IEEEARES
2008
IEEE
15 years 10 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
IEEECIT
2007
IEEE
15 years 10 months ago
The Value Gap Model: Value-Based Requirements Elicitation
The User requirements of many web-based services are dynamically and continuously changing even during the service time itself. For that reason, web service companies always keep ...
Sang Won Lim, Taek Lee, Sangsoo Kim, Hoh Peter In
AIME
2007
Springer
15 years 10 months ago
Healthcare Knowledge Management: The Art of the Possible
Abstract. Healthcare knowledge management is an active, yet not a well characterized research topic. In this chapter, we attempt to characterize healthcare knowledge management and...
Syed Sibte Raza Abidi
POLICY
2007
Springer
15 years 10 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...