Sciweavers

1363 search results - page 114 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
125
Voted
ICDCS
1998
IEEE
15 years 7 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
GRID
2006
Springer
15 years 3 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
126
Voted
IJCIS
1998
107views more  IJCIS 1998»
15 years 3 months ago
Supporting Electronic Commerce Transactions with Contracting Services
Abstracting from basic communication mechanisms such as transactionally secure remote procedure calls and remote database access mechanisms, this includes service trading and bro...
Michael Merz, Frank Griffel, M. Tuan Tu, Stefan M&...
169
Voted
IPPS
2010
IEEE
15 years 1 months ago
Use of Peer-To-Peer technology in Internet access networks and its impacts
Abstract--Objectives of the dissertation are impacts of Peerto-Peer (P2P) traffic on Internet core networks as well as novel approaches for using P2P technology in Internet access ...
Peter Danielis, Dirk Timmermann
394
Voted
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
17 years 3 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...