Sciweavers

186 search results - page 22 / 38
» Efficient Access Control for Composite Applications
Sort
View
IEEEMM
2002
466views more  IEEEMM 2002»
14 years 9 months ago
Measuring Web Application Quality with WebQEM
measuring the product's "lower abstraction attributes."5 We see attributes as measurable properties of an entity--here, a Web application--and propose using a qualit...
Luis Olsina, Gustavo Rossi
ICSOFT
2007
14 years 11 months ago
Solving Design Issues in Web Meta-Model Approach to Support End-User Development
End-user development is proposed as a solution to the issues business organisations face when developing web applications to support their business processes. We are proposing a me...
Buddhima De Silva, Athula Ginige
WWW
2007
ACM
15 years 10 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
USITS
2001
14 years 11 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
EUROPKI
2006
Springer
15 years 1 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng