Sciweavers

3544 search results - page 33 / 709
» Information Security in Open Systems
Sort
View
SEMCO
2008
IEEE
15 years 5 months ago
Entity Name System: The Back-Bone of an Open and Scalable Web of Data
Recognizing that information from different sources refers to the same (real world) entity is a crucial challenge in instance-level information integration, as it is a pre-requisi...
Paolo Bouquet, Heiko Stoermer, Claudia Nieder&eacu...
SACMAT
2005
ACM
15 years 4 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
EGOV
2010
Springer
14 years 9 months ago
Information Strategies for Open Government: Challenges and Prospects for Deriving Public Value from Government Transparency
Information-based strategies to promote open government offer many opportunities to generate social and economic value through public use of government information. Public and poli...
Sharon S. Dawes, Natalie Helbig
CCS
2010
ACM
15 years 2 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
HASE
2008
IEEE
15 years 5 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...