Sciweavers

611 search results - page 67 / 123
» Security Issues in Service Composition
Sort
View
LCN
2006
IEEE
15 years 5 months ago
Efficient Algorithms for Secure Multicast key Management
Group Multicast is becoming a prevalent issue in Network applications such as teleconferencing, payper-view, and information services. In order to secure group communications by p...
Elham Khabiri, Saïd Bettayeb
ISPW
2009
IEEE
15 years 6 months ago
Distributed Orchestration Versus Choreography: The FOCAS Approach
Web service orchestration is popular because the application logic is defined from a central and unique point of view, but it suffers from scalability issues. In choreography, the ...
Gabriel Pedraza, Jacky Estublier
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 6 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
IASTEDSE
2004
15 years 1 months ago
Mobile, on demand access of service-annotated 3D maps
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
16 years 11 days ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....