Sciweavers

2250 search results - page 28 / 450
» Authorizing applications in singularity
Sort
View
MKM
2004
Springer
15 years 3 months ago
CPoint: Dissolving the Author's Dilemma
Abstract. Automated knowledge management techniques critically depend on the availability of semantically enhanced documents which are hard to come by in practice. Starting from a ...
Andrea Kohlhase, Michael Kohlhase
JCS
2007
103views more  JCS 2007»
14 years 9 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
ICWL
2005
Springer
15 years 3 months ago
An Online Template-Based Authoring System for E-Learning
This paper presents an online authoring system that allows users to create interactive course content and course structure on the Internet in a fast and easy way without any progra...
Simon Hui, James Liu
95
Voted
DBSEC
2011
233views Database» more  DBSEC 2011»
14 years 1 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
SIGDOC
1998
ACM
15 years 1 months ago
Documentation Integrity for Safety-Critical Applications: The COHERE Project
A key aspect of the COHERE project involves building an authoring system for documentation for safety-critical systems. Following a set of documentation integrity maxims, the proj...
David G. Novick, Joel Juillet