Sciweavers

1943 search results - page 291 / 389
» Web application security engineering
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 4 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 11 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
EDBTW
2004
Springer
15 years 9 months ago
Index-Based Keyword Search in Mediator Systems
Many users and applications require the integration of semi-structured data from autonomous, heterogeneous Web sources. Over the last years mediator systems have emerged that use d...
Ingolf Geist
EUROSYS
2006
ACM
16 years 1 months ago
URICA: Usage-awaRe Interactive Content Adaptation for mobile devices
Usage-awaRe Interactive Content Adaptation (URICA) is an automatic technique that adapts content for display on mobile devices based on usage semantics. URICA allows users who are...
Iqbal Mohomed, Jim Chengming Cai, Eyal de Lara
124
Voted
IEEESCC
2006
IEEE
15 years 10 months ago
Applying Distributed Business Rules - The VIDRE Approach
Today’s business processes are not static, they need to be adapted frequently to reflect changing business requirements. Several business process languages such as WS-BPEL have...
Florian Rosenberg, Christoph Nagl, Schahram Dustda...