Sciweavers

3086 search results - page 102 / 618
» Developing Secure Web Applications
Sort
View
135
Voted
ISF
2007
121views more  ISF 2007»
15 years 2 months ago
Virtual organization security policies: An ontology-based integration approach
Abstract This paper addresses the specification of a security policy ontology framework to mediate security policies between virtual organizations (VO) and real organizations (RO)....
Saravanan Muthaiyah, Larry Kerschberg
121
Voted
SCFBM
2008
104views more  SCFBM 2008»
15 years 2 months ago
A Perl toolkit for LIMS development
Background: High throughput laboratory techniques generate huge quantities of scientific data. Laboratory Information Management Systems (LIMS) are a necessary requirement, dealin...
James A. Morris, Simon A. Gayther, Ian J. Jacobs, ...
177
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 9 months ago
Secure Communication and Access Control for Mobile Web Service Provisioning
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welco...
Satish Narayana Srirama, Anton Naumenko
137
Voted
SEMWEB
2010
Springer
14 years 9 months ago
A taskonomy for the Semantic Web
The modalities of search and browse dominate current thinking about interaction with the Web. Given the Web's origins as a global hypertext system, it is understandable that t...
Tom Heath
126
Voted
CSMR
2006
IEEE
15 years 8 months ago
Towards a Holistic Approach to Redesigning Legacy Applications for the Web with UWAT
Web applications design methodologies hold the promise of engineering high-quality and long-lived Web systems and rich Internet applications. However, many such methodologies focu...
Damiano Distante, Scott R. Tilley, Gerardo Canfora