Sciweavers

376 search results - page 61 / 76
» Integrity constraints in trust management
Sort
View
IEEEARES
2006
IEEE
15 years 5 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
JUCS
2010
124views more  JUCS 2010»
14 years 10 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
PODS
2009
ACM
113views Database» more  PODS 2009»
16 years 8 days ago
Relative information completeness
The paper investigates the question of whether a partially closed database has complete information to answer a query. In practice an enterprise often maintains master data Dm, a ...
Wenfei Fan, Floris Geerts
DATE
2007
IEEE
126views Hardware» more  DATE 2007»
15 years 6 months ago
The ARTEMIS cross-domain architecture for embedded systems
platform and a suite of abstract components with which new developments in different application domains can be engineered with minimal effort [1]p.16. Generic platforms, or refere...
Hermann Kopetz
GIS
2009
ACM
16 years 24 days ago
Efficient Viewpoint Assignment for Urban Texture Documentation
We envision participatory texture documentation (PTD) as a process in which a group of users (dedicated individuals and/or general public) with camera-equipped mobile phones parti...
Cyrus Shahabi, Farnoush Banaei Kashani, Houtan Shi...