Sciweavers

2250 search results - page 28 / 450
» Authorizing applications in singularity
Sort
View
MKM
2004
Springer
15 years 5 months ago
CPoint: Dissolving the Author's Dilemma
Abstract. Automated knowledge management techniques critically depend on the availability of semantically enhanced documents which are hard to come by in practice. Starting from a ...
Andrea Kohlhase, Michael Kohlhase
JCS
2007
103views more  JCS 2007»
14 years 11 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
ICWL
2005
Springer
15 years 5 months ago
An Online Template-Based Authoring System for E-Learning
This paper presents an online authoring system that allows users to create interactive course content and course structure on the Internet in a fast and easy way without any progra...
Simon Hui, James Liu
DBSEC
2011
233views Database» more  DBSEC 2011»
14 years 3 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
SIGDOC
1998
ACM
15 years 4 months ago
Documentation Integrity for Safety-Critical Applications: The COHERE Project
A key aspect of the COHERE project involves building an authoring system for documentation for safety-critical systems. Following a set of documentation integrity maxims, the proj...
David G. Novick, Joel Juillet