Sciweavers

5273 search results - page 203 / 1055
» Secured Web Access
Sort
View
147
Voted
EWCBR
2008
Springer
15 years 6 months ago
Provenance, Trust, and Sharing in Peer-to-Peer Case-Based Web Search
Despite the success of modern Web search engines, challenges remain when it comes to providing people with access to the right information at the right time. In this paper, we desc...
Peter Briggs, Barry Smyth
ISCAICIS
2000
15 years 6 months ago
Design and Development of Knowledge-Based Systems on the Web
The World Wide Web (Web) offers a large potential for delivery of various information-based services, including the services of intelligent applications. As access to the Web has ...
Ralph F. Grove
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
15 years 11 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
145
Voted
CIS
2004
Springer
15 years 10 months ago
Application of Web Service in Web Mining
To solve the problems we now encounter in web mining, We first propose a new distributed computing strategy——web service. It suggests building a web mining system based on web ...
Beibei Li, Jiajin Le
147
Voted
GRID
2005
Springer
15 years 10 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...