Sciweavers

6844 search results - page 1096 / 1369
» Web Service Security
Sort
View
WWW
2005
ACM
16 years 5 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
WWW
2004
ACM
16 years 5 months ago
OREL: an ontology-based rights expression language
This paper proposes an Ontology-based Rights Expression Language, called OREL. Based on OWL Web Ontology Language, OREL allows not only users but also machines to handle digital r...
Yuzhong Qu, Xiang Zhang, Huiying Li
195
Voted
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
16 years 4 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher
MM
2006
ACM
124views Multimedia» more  MM 2006»
15 years 10 months ago
Blazingly fast image copyright enforcement
Many photo agencies use the web to sell access to their image collections. Despite significant security measures, images may be stolen and distributed, making it necessary to det...
Herwig Lejsek, Friðrik Heiðar Ásmun...
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 10 months ago
Online Fundraising for Environmental Nonprofit Organizations
Although the Internet provides nonprofit organizations with unprecedented opportunities for fundraising, the volume of online donations has been miniscule. Since one reason for th...
Irene Pollach, Horst Treiblmaier, Arne Floh
« Prev « First page 1096 / 1369 Last » Next »