Sciweavers

5273 search results - page 98 / 1055
» Secured Web Access
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 1 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
GIL
2010
15 years 1 months ago
Agribusiness 2.0
Abstract: Die Anwendung von Web 2.0 Tools innerhalb von Unternehmen erm
Jurek Hille
ICWS
2003
IEEE
15 years 5 months ago
A Web Service Approach to Universal Accessibility in Collaboration Services
The enormous growth in wireless communications and miniaturized handheld devices in the last few years, have given rise to a vast range of new services, for heterogeneous user env...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox, Kang-Seok ...
148
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul