Sciweavers

2061 search results - page 11 / 413
» Authorization for Metacomputing Applications
Sort
View
121
Voted
SACMAT
2006
ACM
15 years 6 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
115
Voted
DOCENG
2010
ACM
15 years 1 months ago
Using model driven engineering technologies for building authoring applications
Building authoring applications is a tedious and complex task that requires a high programming effort. Document technologies, especially XML based ones, can help in reducing such ...
Olivier Beaudoux, Arnaud Blouin, Jean-Marc J&eacut...
103
Voted
ISMAR
2008
IEEE
15 years 6 months ago
ComposAR: An intuitive tool for authoring AR applications
This paper introduces ComposAR, a tool to allow a wide audience to author AR and MR applications. It is unique in that it supports both visual programming and interpretive scripti...
Hartmut Seichter, Julian Looser, Mark Billinghurst
SAINT
2007
IEEE
15 years 6 months ago
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service
The Central Authentication Service (CAS) is a middleware for constructing a Single Sign On infrastructure for Web applications and has been developed by JA-SIG. In this paper, we ...
Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji...
96
Voted
JIIS
2002
118views more  JIIS 2002»
15 years 1 days ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...