Sciweavers

377 search results - page 46 / 76
» Service Creation
Sort
View
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 1 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
95
Voted
IJCAI
2003
15 years 1 months ago
Deep Annotation for Information Integration
The success of the Semantic Web crucially depends on the easy creation, integration and use of semantic data. For this purpose, we consider an integration scenario that defies co...
Siegfried Handschuh, Steffen Staab, Raphael Volz, ...
152
Voted
CORR
2004
Springer
148views Education» more  CORR 2004»
15 years 11 days ago
Supporting Bandwidth Guarantee and Mobility for Real-Time Applications on Wireless LANs
The proliferation of IEEE 802.11-based wireless LANs opens up avenues for creation of several tetherless and mobility oriented services. Most of these services, like voice over WL...
Srikant Sharma, Kartik Gopalan, Ningning Zhu, Gang...
IPPS
2007
IEEE
15 years 6 months ago
Spinneret: A Log Random Substrate for P2P Networks
Until now, structured and unstructured networks have been considered in absentia of each other. We believe that next-generation P2P services will require both structured and unstr...
Jeff Rose, Cyrus P. Hall, Antonio Carzaniga
ACSAC
2000
IEEE
15 years 5 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...