Sciweavers

5639 search results - page 914 / 1128
» Timed Abstract Non-interference
Sort
View
BIS
2007
124views Business» more  BIS 2007»
15 years 4 months ago
Evaluating Quality of Web Services: A Risk-Driven Approach
Abstract. Composing existing web services to obtain new functionalities is important for e-business applications. Deficiencies of aggregated web services can be compensated involv...
Natallia Kokash, Vincenzo D'Andrea
CSREASAM
2008
15 years 4 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
DAIS
2008
15 years 4 months ago
A Comprehensive Context Modeling Framework for Pervasive Computing Systems
Context management in pervasive computing environments must reflect the specific characteristics of these environments, e.g. distribution, mobility, resource-constrained devices, o...
Roland Reichle, Michael Wagner, Mohammad Ullah Kha...
DBSEC
2008
115views Database» more  DBSEC 2008»
15 years 4 months ago
P4A: A New Privacy Model for XML
Abstract. We propose a new privacy model for XML data called Privacy for All (P4A) to capture collectors privacy practice and data providers privacy preferences. Through P4A data c...
Angela Cristina Duta, Ken Barker
DBSEC
2008
137views Database» more  DBSEC 2008»
15 years 4 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...