Sciweavers

145 search results - page 17 / 29
» Preserving Privacy Based on Semantic Policy Tools
Sort
View
108
Voted
IUI
2006
ACM
15 years 7 months ago
Recovering semantic relations from web pages based on visual cues
Recovering semantic relations between different parts of web pages are of great importance for multi-platform web interface development, as they make it possible to re-distribute ...
Peifeng Xiang, Yuanchun Shi
103
Voted
ISI
2006
Springer
15 years 1 months ago
Semantic Analytics Visualization
In this paper we present a new tool for semantic analytics through 3D visualization called "Semantic Analytics Visualization" (SAV). It has the capability for visualizing...
Leonidas Deligiannidis, Amit P. Sheth, Boanerges A...
117
Voted
CSFW
2006
IEEE
15 years 7 months ago
Computationally Sound Compositional Logic for Key Exchange Protocols
We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan...
GIS
2008
ACM
16 years 2 months ago
A location aware role and attribute based access control system
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
121
Voted
SAINT
2006
IEEE
15 years 7 months ago
Dynamic Configuration of Semantic-Based Service Provisioning to Portable Devices
Context-awareness is starting to emerge as a key driving principle for the design and provisioning of pervasive services in pervasive computing environments. Semantic languages se...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...