Exhibition 2009
DOI: 10.1109/ieeegcc.2009.5734300
|View full text |Cite
|
Sign up to set email alerts
|

An investigation on integrating XML-based security into Web services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 0 publications
0
12
0
Order By: Relevance
“…Put another way, people and their needs have to be at the center of any vision of software because technology is only here to make our lives and businesses better, easier, faster or whatever else we require. Web 2.0 ideas have been successful (at least) because they effectively put people back into the technological equation [9]. This even goes as far as turning it on its head entirely and making the technology about people.…”
Section: Introductionmentioning
confidence: 98%
See 3 more Smart Citations
“…Put another way, people and their needs have to be at the center of any vision of software because technology is only here to make our lives and businesses better, easier, faster or whatever else we require. Web 2.0 ideas have been successful (at least) because they effectively put people back into the technological equation [9]. This even goes as far as turning it on its head entirely and making the technology about people.…”
Section: Introductionmentioning
confidence: 98%
“…Engaging them in a positive way can often turn around potential problems. If you blog, you know this; often, engaging disagreeable posters turns them into instant friends [9].…”
Section: Have Some Institutional Gutsmentioning
confidence: 99%
See 2 more Smart Citations
“…Any institute can be considered as an application for this scenario. Firstly, employees will register in the system, the signature of the employee is scanned and entered in the system to get its key share this key is printed on a card and given to the employee and the simple share is entered to the system database [18,32]. During authentication, the employee inserts his own card in the card reader mounted in the entrance to read the key share from the card and superimposes over the corresponding simple share available in the database.…”
Section: Human Machine Identificationmentioning
confidence: 99%