Sciweavers

1757 search results - page 183 / 352
» Secure Content Validation
Sort
View
COLCOM
2008
IEEE
15 years 1 months ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
WICSA
2008
15 years 1 months ago
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
This paper introduces an architectural style for enabling end-users to quickly design and deploy software systems in domains characterized by highly personalized and dynamic requi...
João Pedro Sousa, Bradley R. Schmerl, Vahe ...
TKDE
2008
177views more  TKDE 2008»
14 years 11 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
COMPSEC
2004
95views more  COMPSEC 2004»
14 years 11 months ago
Cumulative notarization for long-term preservation of digital signatures
The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media ...
Dimitrios Lekkas, Dimitris Gritzalis
TPDS
2008
87views more  TPDS 2008»
14 years 11 months ago
rStream: Resilient and Optimal Peer-to-Peer Streaming with Rateless Codes
Due to the lack of stability and reliability in peer-to-peer networks, multimedia streaming over peer-to-peer networks represents several fundamental engineering challenges. First...
Chuan Wu, Baochun Li