Sciweavers

744 search results - page 16 / 149
» The Traust Authorization Service
Sort
View
LISA
2008
15 years 11 hour ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
IAAI
2011
13 years 9 months ago
NewsFinder: Automating an Artificial Intelligence News Service
NewsFinder automates the steps involved in finding, selecting and publishing news stories that meet subjective judgments of relevance and interest to the Artificial Intelligence c...
Liang Dong, Reid G. Smith, Bruce G. Buchanan
ICSEA
2007
IEEE
15 years 3 months ago
Design and Development Tools for Next Generation Mobile Services
The actual standards for service authoring, composition and development are not easy to port and to apply for next generation mobile applications. This paper describes some tools ...
Giovanni Bartolomeo, Casalicchio Casalicchio, Stef...
OIR
2008
87views more  OIR 2008»
14 years 9 months ago
E-science and information services: a missing link in the context of digital libraries
: Purpose: This paper analysis if and how far Library and Information Services (LIS) are supporting E-Science and Grid-Computing projects funded by authorities in the EU and German...
Achim Osswald
IAJIT
2010
133views more  IAJIT 2010»
14 years 8 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa