Sciweavers

744 search results - page 71 / 149
» The Traust Authorization Service
Sort
View
RTCSA
2007
IEEE
15 years 4 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
ICSOC
2007
Springer
15 years 4 months ago
Contextualized B2B Registries
Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and ...
Uwe Radetzki, Mike J. Boniface, Mike Surridge
FTDCS
2003
IEEE
15 years 3 months ago
Autonomous Decentralized Community Concept and Architecture for a Complex Adaptive Information System
The global information service in the Internet is a heterogeneous and rapidly evolving environment. Constantly, new information services are added, others are modified, removed or...
Khaled Ragab, Takanori Ono, Naohiro Kaji, Kinji Mo...
CHI
2010
ACM
15 years 1 months ago
Across boundaries of influence and accountability: the multiple scales of public sector information systems
The use of ICTs in the public sector has long been touted for its potential to transform the institutions that govern and provide social services. The focus, however, has largely ...
Christopher A. Le Dantec, W. Keith Edwards
IADIS
2004
14 years 11 months ago
Security Assertion Exchange for the Agent on the Semantic Web
The Semantic Web's success will depend on the implementation and use of Web Service becoming preeminent in Ecommerce, which will likely be agent-based in the future. On the S...
Joo-Young Lee, Ki-Young Moon