Sciweavers

2061 search results - page 87 / 413
» Authorization for Metacomputing Applications
Sort
View
111
Voted
ICDCS
2002
IEEE
15 years 5 months ago
Reasoning about Joint Administration of Access Policies for Coalition Resources
We argue that joint administration of access policies for a dynamic coalition formed by autonomous domains requires that these domains set up a coalition authority that distribute...
Himanshu Khurana, Virgil D. Gligor, John Linn
78
Voted
SACMAT
2010
ACM
15 years 5 months ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
ECIR
2007
Springer
15 years 2 months ago
Entropy-Based Authorship Search in Large Document Collections
The purpose of authorship search is to identify documents written by a particular author or in a particular style in large document collections. Standard search engines match docum...
Ying Zhao, Justin Zobel
87
Voted
LREC
2008
150views Education» more  LREC 2008»
15 years 2 months ago
Automatic Document Quality Control
This paper focuses on automatically improving the readability of documents. We explore mechanisms relating to content control that could be used (i) by authors to improve the qual...
Neil Newbold, Lee Gillam
93
Voted
LWA
2007
15 years 2 months ago
Semantic Perspectives on Knowledge Management and E-Learning
Knowledge Management (KM) and E-Learning (EL) applications interface more and more as their objects of concern consist in ’captured knowledge’ resp. ’learning objects’, i....
Andrea Kohlhase