Sciweavers

5273 search results - page 168 / 1055
» Secured Web Access
Sort
View
SRDS
2003
IEEE
15 years 9 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
ICCS
2001
Springer
15 years 9 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
CCS
2005
ACM
15 years 10 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
IADIS
2008
15 years 5 months ago
Web Mining: A Key to Improve Business on Web
This paper takes an overview of the web mining concept and how it can be useful and beneficial to the business improvement by facilitating its applications in various areas over t...
Pradnya Purandare
WWW
2004
ACM
16 years 5 months ago
Towards Semantic Web Portals
A web portal is a platform for information presentation and information exchange over the Internet in a community of interest. Conventional web technologies used in web portals pr...
Dieter Fensel, Holger Lausen, Michael Stollberg, R...