Sciweavers

901 search results - page 136 / 181
» Secure Internet Applications Based on Mobile Agents
Sort
View
ICTAI
2009
IEEE
15 years 8 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
MSE
2002
IEEE
179views Hardware» more  MSE 2002»
15 years 6 months ago
A SOAP-Oriented Component-Based Framework Supporting Device-Independent Multimedia Web Services
A web service is a programmable web application accessible using standard Internet protocols. A threelayer architecture has been suggested for web services: service providers, ser...
Jia Zhang, Jen-Yao Chung
ICS
2003
Tsinghua U.
15 years 7 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ESWA
2002
134views more  ESWA 2002»
15 years 1 months ago
A personalized recommender system based on web usage mining and decision tree induction
A personalized product recommendation is an enabling mechanism to overcome information overload occurred when shopping in an Internet marketplace. Collaborative filtering has been...
Yoon Ho Cho, Jae Kyeong Kim, Soung Hie Kim
ICEIS
2003
IEEE
15 years 7 months ago
Toxic Farm: A Cooperative Management Platform for Virtual Teams and Enterprises
: The proliferation of the Internet has revolutionized the way people work together for business. People located at remote places can collaborate across organizational and national...
Hala Skaf-Molli, Pascal Molli, Gérald Oster...