Sciweavers

2250 search results - page 35 / 450
» Authorizing applications in singularity
Sort
View
NDSS
1997
IEEE
15 years 1 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
CIKM
2008
Springer
14 years 11 months ago
Professional credibility: authority on the web
Opinion mining techniques add another dimension to search and summarization technology by actually identifying the author's opinion about a subject, rather than simply identi...
Jack G. Conrad, Jochen L. Leidner, Frank Schilder
SIS
2004
14 years 11 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
PERCOM
2004
ACM
15 years 9 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
ISMAR
2009
IEEE
15 years 4 months ago
In-place 3D sketching for authoring and augmenting mechanical systems
We present a framework for authoring three-dimensional virtual scenes for Augmented Reality (AR) which is based on hand sketching. Sketches consisting of multiple components are u...
Oriel Bergig, Nate Hagbi, Jihad El-Sana, Mark Bill...