Sciweavers

1818 search results - page 195 / 364
» How users use access control
Sort
View
DC
2001
15 years 6 months ago
The use of Metadata in Denmark
A wide range of metadata projects in Denmark over the last 4-5 years are described. A new Danish legal deposit act in 1997 facilitated cooperation in the creation of a common appl...
Leif Andresen
146
Voted
AINA
2007
IEEE
15 years 9 months ago
Using Argumentative Agents to Manage Communities of Web Services
This paper presents a framework for specifying Web services communities. A Web service is an accessible application that humans, software agents, and other applications in general ...
Jamal Bentahar, Zakaria Maamar, Djamal Benslimane,...
DBSEC
2003
155views Database» more  DBSEC 2003»
15 years 6 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
INFOCOM
2005
IEEE
15 years 10 months ago
Cooperation and decision-making in a wireless multi-provider setting
— In this paper we investigate network design for a wireless service provider using two orthogonal technologies: a WAN technology with uniform spatial coverage and set of LAN acc...
Alex Zemlianov, Gustavo de Veciana
129
Voted
DAGSTUHL
2007
15 years 6 months ago
Ubiquitous Nature of Event-Driven Approaches: A Retrospective View
This paper retrospectively analyzes the progress of event-based capability and their applicability in various domains. Although research on event-based approaches started in a hum...
Sharma Chakravarthy, Raman Adaikkalavan