1 | -- | 0 | Barbara Carminati, Bhavani M. Thuraisingham. Introduction to secure Semantic Web |
2 | -- | 12 | Palanivel Balaji Kodeswaran, Sethuram Balaji Kodeswaran, Anupam Joshi, Tim Finin. Enforcing security in semantics driven policy based networks |
13 | -- | 23 | Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino. Trust establishment in the formation of Virtual Organizations |
24 | -- | 34 | William M. Fitzgerald, Simon N. Foley. Aligning Semantic Web applications with network access controls |
35 | -- | 41 | Ashraful Alam, Latifur Khan, Bhavani M. Thuraisingham. Geospatial Resource Description Framework (GRDF) and security constructs |
42 | -- | 49 | Ángel García-Crespo, Juan Miguel Gómez Berbís, Ricardo Colomo Palacios, Giner Alor-Hernández. SecurOntology: A semantic web access control framework |
50 | -- | 58 | Chin-Shan Wu, Fei-Fei Cheng, David C. Yen, Yu-Wen Huang. User acceptance of wireless technology in organizations: A comparison of alternative models |
59 | -- | 68 | Xiangyang Wang, Yong-Jian Yu, Hong-Ying Yang. An effective image retrieval scheme using color, texture and shape features |
69 | -- | 79 | Carlos Cares, Xavier Franch, Anna Perini, Angelo Susi. Towards interoperability of i* models using iStarML |
80 | -- | 95 | Lukasz Cyra, Janusz Górski. SCF - A framework supporting achieving and assessing conformity with standards |
96 | -- | 107 | Peng Liu, Meng Yu. Damage assessment and repair in attack resilient distributed database systems |
108 | -- | 113 | Qasem A. Al-Radaideh, Kamal H. Masri. Improving mobile multi-tap text entry for Arabic language |