An ontology-based framework for a Less Invasive Domestic Management System (LIDoMS) | 0 | 0.34 | 2020 |
Secure Selections on Encrypted Multi-writer Streams | 0 | 0.34 | 2019 |
An Event-Driven Integrative Framework Enabling Information Notification Among Manufacturing Resources | 1 | 0.35 | 2019 |
Strengthening the Cybersecurity of Manufacturing Companies: A Semantic Approach Compliant with the NIST Framework. | 0 | 0.34 | 2018 |
Semantic based events signaling for AAL systems. | 5 | 0.41 | 2018 |
Secure Queries on Encrypted Multi-writer Tables | 0 | 0.34 | 2017 |
Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme | 0 | 0.34 | 2017 |
Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption. | 0 | 0.34 | 2014 |
Multidimensional Reputation Network for Service Composition in the Internet of Things | 1 | 0.35 | 2014 |
Answering queries using pairings. | 0 | 0.34 | 2014 |
A Framework for Trust-Based Multidisciplinary Team Recommendation. | 1 | 0.38 | 2013 |
Querying data across different legal domains | 0 | 0.34 | 2013 |
Identity-based security systems for vehicular ad-hoc networks | 3 | 0.39 | 2013 |
Distributed access control policies for spectrum sharing. | 1 | 0.35 | 2013 |
Data Quality Evaluation of Scientific Datasets - A Case Study in a Policy Support Context. | 1 | 0.35 | 2013 |
A Method and Guidelines for the Cooperation of Ontologies and Relational Databases in Semantic Web Applications. | 1 | 0.36 | 2012 |
BPMN: An introduction to the standard | 115 | 4.48 | 2012 |
A Flexible Approach to Multisession Trust Negotiations | 3 | 0.43 | 2012 |
A rule-based policy language for selective trust propagation in social networks | 0 | 0.34 | 2011 |
Privacy-Preserving Updates to Anonymous and Confidential Databases | 2 | 0.39 | 2011 |
Adaptive and Distributed Access Control in Cognitive Radio Networks | 5 | 0.69 | 2010 |
State-Based firewall for industrial protocols with critical-state prediction monitor | 0 | 0.34 | 2010 |
Distributed Intrusion Detection System For Scada Protocols | 2 | 0.59 | 2010 |
Modbus/DNP3 State-Based Intrusion Detection System | 45 | 2.70 | 2010 |
Advanced Trust Negotiations In Critical Infrastructures | 3 | 0.43 | 2010 |
Combining access control and trust negotiations in an On-line Social Network. | 3 | 0.46 | 2010 |
Integrating Privacy Policies into Business Processes. | 1 | 0.39 | 2009 |
Modeling and Validating BPMN Diagrams | 1 | 0.37 | 2009 |
State-based network intrusion detection systems for SCADA protocols: a proof of concept | 21 | 1.49 | 2009 |
Design And Implementation Of A Secure Modbus Protocol | 21 | 1.70 | 2009 |
An experimental investigation of malware attacks on SCADA systems. | 29 | 1.99 | 2009 |
Privately Updating Suppression and Generalization based k-Anonymous Databases | 0 | 0.34 | 2008 |
Scada Malware, a Proof of Concept | 13 | 1.66 | 2008 |
Identity-based long running negotiations | 5 | 0.51 | 2008 |
Building a Domain Ontology from Glossaries: A General Methodology | 3 | 0.49 | 2008 |
Introducing privacy in a hospital information system | 5 | 0.45 | 2008 |
Privacy-aware role based access control | 122 | 4.51 | 2007 |
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations | 10 | 0.70 | 2007 |
Private Updates to Anonymous Databases | 5 | 0.74 | 2006 |
Equivalences and optimizations in an expressive XSLT subset | 1 | 0.36 | 2006 |
A framework for modeling and evaluating automatic semantic reconciliation | 70 | 2.71 | 2005 |
Short-Term Content Adaptation in Web-based Learning Systems | 1 | 0.38 | 2005 |
Representation and management of ontologies in cultural heritage domain | 1 | 0.36 | 2005 |
A model for short-term content adaptation | 1 | 0.37 | 2005 |
Equivalences and optimizations in an expressive XSLT fragment | 4 | 0.51 | 2004 |
Evaluating Matching Algorithms: the Monotonicity Principle | 11 | 0.93 | 2003 |
A similarity based relational algebra for Web and multimedia data | 8 | 0.55 | 2003 |
A Model for Schema Integration in Heterogeneous Databases | 5 | 0.51 | 2003 |
Imprecision Based Queries Over Materialized and Virtual Integrated Views | 0 | 0.34 | 2003 |
Workflow Architecture for Interactive Video Management Systems | 1 | 0.36 | 2002 |