Sciweavers

698 search results - page 118 / 140
» Using Semantic Web Resources for Data Quality Management
Sort
View
PET
2004
Springer
15 years 2 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
BPSC
2007
171views Business» more  BPSC 2007»
14 years 11 months ago
XML Databases: Principles and Usage
Originally XML was used as a standard protocol for data exchange in computing. The evolution of information technology has opened up new situations in which XML can be used to aut...
Jaroslav Pokorný
IJSWIS
2007
133views more  IJSWIS 2007»
14 years 9 months ago
Association Rule Ontology Matching Approach
This paper presents a hybrid, extensional and asymmetric matching approach designed to find out semantic relations (equivalence and subsumption) between entities issued from two ...
Jérôme David, Fabrice Guillet, Henri ...
CCS
2003
ACM
15 years 2 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
SOUPS
2006
ACM
15 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...