Sciweavers

3953 search results - page 215 / 791
» Enhancing web accessibility
Sort
View
108
Voted
WWW
2007
ACM
16 years 4 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
135
Voted
SAC
2005
ACM
15 years 9 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
136
Voted
SWS
2004
ACM
15 years 9 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
142
Voted
CAISE
2007
Springer
15 years 7 months ago
Specification and Verification of Authorization Policies for Web Services Composition
The management and maintenance of a large number of Web services is not easy and, in particular, needs appropriate authorization policies to be defined so as to realize reliable an...
Mohsen Rouached, Claude Godart
124
Voted
ERCIMDL
2006
Springer
124views Education» more  ERCIMDL 2006»
15 years 7 months ago
Design and Selection Criteria for a National Web Archive
Web archives and Digital Libraries are conceptually similar, as they both store and provide access to digital contents. The process of loading documents into a Digital Library usua...
Daniel Gomes, Sérgio Freitas, Mário ...