Sciweavers

883 search results - page 122 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
107
Voted
CCS
2005
ACM
15 years 6 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
ECIS
2000
15 years 1 months ago
Open Source Movements as a Model for Organizing
Open source software such as the operating system Linux has in a few years created much attention as an alternative way to develop and distribute software. Open source is to let an...
Jan Ljungberg
85
Voted
DAIS
2003
15 years 1 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
113
Voted
SKG
2006
IEEE
15 years 6 months ago
Mathematics Computing Environment on the Web
With the rapid evolution of web technology and Internet, the mathematical web has emerged as a new research trend, which changes the traditional manner of mathematical scientific ...
Li Liu, Yi Yang, Lian Li
RBAC
1998
84views more  RBAC 1998»
15 years 1 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park