Sciweavers

956 search results - page 126 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...
CONCURRENCY
2002
89views more  CONCURRENCY 2002»
14 years 9 months ago
MyPYTHIA: a recommendation portal for scientific software and services
In this paper, we outline the design of a recommendation system (MyPYTHIA) implemented as a web portal. MyPYTHIA's design objectives include evaluating the quality and perfor...
Elias N. Houstis, Ann Christine Catlin, Nitesh Dha...
SAC
2009
ACM
15 years 4 months ago
Applying Reo to service coordination in long-running business transactions
Ensuring transactional behavior of business processes and web service compositions is an essential issue in the area of serviceoriented computing. Transactions in this context may ...
Natallia Kokash, Farhad Arbab
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
15 years 10 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
15 years 10 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang