Sciweavers

490 search results - page 22 / 98
» Enabling User Control with Personal Identity Management
Sort
View
79
Voted
ISW
2005
Springer
15 years 6 months ago
Device-Enabled Authorization in the Grey-System
d Abstract) Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar Carnegie Mellon University, Pittsburgh, Pennsylvania, USA We describe ...
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Mic...
97
Voted
JSW
2007
124views more  JSW 2007»
15 years 9 days ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
110
Voted
PERCOM
2008
ACM
16 years 1 days ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
ICMCS
2000
IEEE
158views Multimedia» more  ICMCS 2000»
15 years 4 months ago
Visualization Methods for Personal Photo Collections: Browsing and Searching in the PhotoFinder
Software tools for personal photo collection management are proliferating, but they usually have limited searching and browsing functions. We implemented the PhotoFinder prototype...
Hyunmo Kang, Ben Shneiderman
93
Voted
SEAA
2008
IEEE
15 years 6 months ago
VieCAR - Enabling Self-adaptive Collaboration Services
Novel forms of collaboration increasingly distribute control among e-workers, thereby allowing agile and autonomous collaboration. However, this requires a novel blend of infrastr...
Daniel Schall, Christoph Dorn, Schahram Dustdar, I...