Sciweavers

3557 search results - page 59 / 712
» Authoring Presentation for OpenMath
Sort
View
EUSFLAT
2001
15 years 6 months ago
Criticality analysis in activity networks under incomplete information
A review of the main results obtained by the authors concerning analysis of networks with imprecise activity duration times, with a stress on the analysis of criticality, is prese...
Stefan Chanas, Didier Dubois, Pawel Zielinski
CSE
2009
IEEE
16 years 8 days ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
WSE
2005
IEEE
15 years 11 months ago
Developing Component-based Adaptive Web Applications with the AMACONTBuilder
The growing need for personalization and device independence calls for effective ways of engineering adaptive Web applications. This requires formats, languages and structured pro...
Zoltán Fiala, Michael Hinz, Klaus Meiß...
ACSAC
1999
IEEE
15 years 9 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
XMLSEC
2003
ACM
15 years 10 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...