Sciweavers

744 search results - page 17 / 149
» The Traust Authorization Service
Sort
View
CORR
2011
Springer
139views Education» more  CORR 2011»
14 years 4 months ago
A Science Model Driven Retrieval Prototype
This paper is about a better understanding on the structure and dynamics of science and the usage of these insights for compensating the typical problems that arises in metadata-d...
Philipp Mayr, Philipp Schaer, Peter Mutschke
ECTEL
2009
Springer
14 years 7 months ago
Using Third Party Services to Adapt Learning Material: A Case Study with Google Forms
Abstract. Current Learning Management Systems were typically conceived to offer a self-contained "one size fits all" learning environment. Adaptive educational systems ha...
Luis de la Fuente Valentín, Abelardo Pardo,...
IEEECIT
2010
IEEE
14 years 7 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
AINA
2011
IEEE
14 years 1 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
IJCIS
1998
107views more  IJCIS 1998»
14 years 9 months ago
Supporting Electronic Commerce Transactions with Contracting Services
Abstracting from basic communication mechanisms such as transactionally secure remote procedure calls and remote database access mechanisms, this includes service trading and bro...
Michael Merz, Frank Griffel, M. Tuan Tu, Stefan M&...