Sciweavers

6844 search results - page 1061 / 1369
» Web Service Security
Sort
View
SACMAT
2003
ACM
15 years 10 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel
147
Voted
SASN
2003
ACM
15 years 10 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
IACR
2011
135views more  IACR 2011»
14 years 4 months ago
An Improved Internet Voting Protocol
Norway is going to experience an Internet voting scheme in September 2011 for local governmental elections, targeting a comprehensive Internet voting system in 2017 for national el...
Mehmet Sabir Kiraz, Süleyman Kardas, Muhammed...
144
Voted
OSDI
2004
ACM
16 years 5 months ago
ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams
As dependence on the World Wide Web continues to grow, so does the need for businesses to have quantitative measures of the client perceived response times of their Web services. ...
David P. Olshefski, Jason Nieh, Erich M. Nahum
SIGMOD
2007
ACM
105views Database» more  SIGMOD 2007»
16 years 5 months ago
Supporting entity search: a large-scale prototype search engine
As the Web has evolved into a data-rich repository, with the standard "page view," current search engines are increasingly inadequate. While we often search for various ...
Tao Cheng, Xifeng Yan, Kevin Chen-Chuan Chang
« Prev « First page 1061 / 1369 Last » Next »