Sciweavers

2250 search results - page 45 / 450
» Authorizing applications in singularity
Sort
View
KESAMSTA
2007
Springer
15 years 3 months ago
Application of Agent-Based Personal Web of Trust to Local Document Ranking
Web is the boundless source of information and no one is able to process the vast amount of new documents published on the web every day, even with filtering out the documents the ...
Marek Kopel, Przemyslaw Kazienko
STOC
2005
ACM
139views Algorithms» more  STOC 2005»
15 years 10 months ago
Spectral norm of random matrices
We study the spectral norm of matrices M that can be factored as M = BA, where A is a random matrix with independent mean zero entries and B is a fixed matrix. Under the (4 + )-th ...
Van H. Vu
ANOR
2005
89views more  ANOR 2005»
14 years 9 months ago
Logic-Based Modeling and Solution of Nonlinear Discrete/Continuous Optimization Problems
This paper presents a review of advances in the mathematical programming approach to discrete/continuous optimization problems. We first present a brief review of MILP and MINLP f...
Sangbum Lee, Ignacio E. Grossmann
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 1 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
ACSAC
1999
IEEE
15 years 2 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...