Sciweavers

2250 search results - page 33 / 450
» Authorizing applications in singularity
Sort
View
73
Voted
ICDM
2007
IEEE
182views Data Mining» more  ICDM 2007»
15 years 4 months ago
Co-ranking Authors and Documents in a Heterogeneous Network
The problem of evaluating scientific publications and their authors is important, and as such has attracted increasing attention. Recent graph-theoretic ranking approaches have d...
Ding Zhou, Sergey A. Orshanskiy, Hongyuan Zha, C. ...
JSW
2008
101views more  JSW 2008»
14 years 9 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
IASTEDSE
2004
14 years 11 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
ITCC
2003
IEEE
15 years 3 months ago
Simplified Authoring for Instructors using Distance Education (SAIDE)
This paper presents an alternative to current authoring methods for use in distance education. Several commercially available distanceeducation authoring tools are briefly discuss...
James Garvin, Eric Alsheimer, Zak Bradshaw, Peter ...