Sciweavers

2250 search results - page 11 / 450
» Authorizing applications in singularity
Sort
View
DOCENG
2010
ACM
14 years 10 months ago
Using model driven engineering technologies for building authoring applications
Building authoring applications is a tedious and complex task that requires a high programming effort. Document technologies, especially XML based ones, can help in reducing such ...
Olivier Beaudoux, Arnaud Blouin, Jean-Marc J&eacut...
HPDC
1998
IEEE
15 years 1 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
ISMAR
2008
IEEE
15 years 4 months ago
ComposAR: An intuitive tool for authoring AR applications
This paper introduces ComposAR, a tool to allow a wide audience to author AR and MR applications. It is unique in that it supports both visual programming and interpretive scripti...
Hartmut Seichter, Julian Looser, Mark Billinghurst
SAINT
2007
IEEE
15 years 3 months ago
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service
The Central Authentication Service (CAS) is a middleware for constructing a Single Sign On infrastructure for Web applications and has been developed by JA-SIG. In this paper, we ...
Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji...
JIIS
2002
118views more  JIIS 2002»
14 years 9 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...