Sciweavers

3721 search results - page 76 / 745
» Infomaster: An Information Integration System
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 3 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
AWIC
2011
Springer
14 years 5 months ago
Enabling Product Comparisons on Unstructured Information Using Ontology Matching
Information extraction approaches are heavily used to gather product information on the Web, especially focusing on technical product specifications. If requesting different sour...
Maximilian Walther, Niels Jäckel, Daniel Schu...
IS
2007
15 years 1 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
ICSOC
2009
Springer
14 years 11 months ago
Using Personal Information Management Infrastructures to Facilitate User-Generated Services for Personal Use
Ad-hoc and situational applications for personal use will gain more and more traction in the work support for knowledge workers (KWers). Personal information is a key element in th...
Olaf Grebner
ECAI
2004
Springer
15 years 7 months ago
FIRE: An Integrated Trust and Reputation Model for Open Multi-Agent Systems
Trust and reputation are central to effective interactions in open multi-agent systems in which agents, that are owned by a variety of stakeholders, can enter and leave the system ...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...