Sciweavers

3544 search results - page 430 / 709
» Information Security in Open Systems
Sort
View
ISI
2004
Springer
15 years 5 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
DIM
2007
ACM
15 years 3 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
TPDS
2010
99views more  TPDS 2010»
14 years 10 months ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li
ESOP
2009
Springer
15 years 6 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands
ISEMANTICS
2010
15 years 1 months ago
Twarql: tapping into the wisdom of the crowd
Twarql is an infrastructure translating microblog posts from Twitter as Linked Open Data in real-time. The approach employed in Twarql can be summarized as follows: (1) extract co...
Pablo N. Mendes, Alexandre Passant, Pavan Kapanipa...