Sciweavers

1422 search results - page 2 / 285
» The Set and Function Approach to Modeling Authorization in D...
Sort
View
ICCV
2009
IEEE
14 years 10 months ago
An Algebraic Approach to Affine Registration of Point Sets
This paper proposes a new affine registration algorithm for matching two point sets in IR2 or IR3. The input point sets are represented as probability density functions, using e...
Jeffrey Ho, Adrian Peter, Anand Rangarajan, Ming-H...
CSCWD
2009
Springer
14 years 10 days ago
E-Breaker: Flexible, distributed environment for collaborative authoring
This paper presents a system called E-Breaker for supporting small and medium size group authoring of any kind of documents following a regular structure. The system supports a de...
Nelson Baloian, Francisco Claude, Roberto Konow, S...
ECOOPW
1998
Springer
13 years 10 months ago
Reflective Authorization Systems
A reflective approach for modeling and implementing authorization systems is presented. The advantages of the combined use of computational reflection and authorization mechanisms...
Massimo Ancona, Walter Cazzola, Eduardo B. Fern&aa...
CONTEXT
2003
Springer
13 years 11 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
ICTAI
2009
IEEE
14 years 12 days ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu