Sciweavers

177 search results - page 30 / 36
» Provably Secure Key Exchange: An Engineering Approach
Sort
View
SACMAT
2009
ACM
15 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
75
Voted
ISI
2008
Springer
14 years 9 months ago
A template alignment algorithm for question classification
Question classification (QC) plays a key role in automated question answering (QA) systems. In Chinese QC, for example, a question is analyzed and then labeled with the question ty...
Cheng-Lung Sung, Min-Yuh Day, Hsu-Chun Yen, Wen-Li...
KBSE
2003
IEEE
15 years 2 months ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère
IJNSEC
2010
163views more  IJNSEC 2010»
14 years 4 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
JWSR
2007
119views more  JWSR 2007»
14 years 9 months ago
Ontology Driven Data Mediation in Web Services
: With the rising popularity of Web services, both academia and industry have invested considerably in Web service description standards, discovery, and composition techniques. The...
Meenakshi Nagarajan, Kunal Verma, Amit P. Sheth, J...