Sciweavers

2061 search results - page 30 / 413
» Authorization for Metacomputing Applications
Sort
View
112
Voted
IASTEDSE
2004
15 years 1 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
79
Voted
ITCC
2003
IEEE
15 years 5 months ago
Simplified Authoring for Instructors using Distance Education (SAIDE)
This paper presents an alternative to current authoring methods for use in distance education. Several commercially available distanceeducation authoring tools are briefly discuss...
James Garvin, Eric Alsheimer, Zak Bradshaw, Peter ...
116
Voted
WISE
2002
Springer
15 years 5 months ago
Towards Translating Authorizations for Transformed XML Documents
Web based services and applications have increased the availability and accessibility of information. XML has recently emerged as an important standard in the area of information ...
Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko K...
106
Voted
MOBILITY
2009
ACM
15 years 5 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
102
Voted
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
15 years 16 days ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...