Sciweavers

704 search results - page 108 / 141
» Resource Access Control for an Internet User Agent
Sort
View
SOCA
2007
IEEE
15 years 4 months ago
Creating Web Services From GUI-Based Applications
— Graphical User Interface (GUI) APplications (GAPs) are ubiquitous and provide various services. However, it is difficult to make GAPs exchange information (i.e., interoperate)...
Mark Grechanik, Kevin M. Conroy, Kishore S. Swamin...
IEEEARES
2008
IEEE
15 years 4 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
COMPSEC
2010
93views more  COMPSEC 2010»
14 years 8 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
AAAI
1998
14 years 11 months ago
Handling Inconsistency for Multi-Source Integration
The overwhelming amount of information sources now available through the internet has increased the need to combine or integrate the data retrieved from these sources in an intell...
Sheila Tejada, Craig A. Knoblock, Steven Minton