Sciweavers

1278 search results - page 197 / 256
» Trust management for Web Services
Sort
View
105
Voted
IJISEC
2007
119views more  IJISEC 2007»
14 years 11 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
EKAW
2004
Springer
15 years 3 months ago
Towards a Knowledge-Aware Office Environment
The objective of the Semantic Web is to make the Web amenable to computer processing, and hence to improve the value that humans can obtain from it. One of the oft-touted user bene...
Les Carr, Timothy Miles-Board, Gary Wills, Arouna ...
CORR
2010
Springer
140views Education» more  CORR 2010»
14 years 12 months ago
An HTTP-Based Versioning Mechanism for Linked Data
Dereferencing a URI returns a representation of the current state of the resource identified by that URI. But, on the Web representations of prior states of a resource are also av...
Herbert Van de Sompel, Robert Sanderson, Michael L...
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 6 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 6 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot