Sciweavers

186 search results - page 11 / 38
» Efficient Access Control for Composite Applications
Sort
View
84
Voted
WWW
2007
ACM
15 years 10 months ago
Mobile shopping assistant: integration of mobile applications and web services
The goal of this poster is to describe our implementation of a new architecture enabling efficient integration between mobile phone applications and Web Services. Using this archi...
Huaigu Wu, Yuri Natchetoi
IMECS
2007
14 years 11 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
83
Voted
JSW
2007
126views more  JSW 2007»
14 years 9 months ago
Efficient Evaluation of Multiple-Output Boolean Functions in Embedded Software or Firmware
— The paper addresses software and firmware implementation of multiple-output Boolean functions based on cascades of Look-Up Tables (LUTs). A LUT cascade is described as a means ...
Vaclav Dvorak
RBAC
1998
84views more  RBAC 1998»
14 years 10 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
103
Voted
ICDCS
2007
IEEE
15 years 1 months ago
Efficient Execution of Continuous Incoherency Bounded Queries over Multi-Source Streaming Data
On-line decision making often involves query processing over time-varying data which arrives in the form of data streams from distributed locations. In such environments typically...
Manish Bhide, Krithi Ramamritham, Mukund Agrawal