Sciweavers

8706 search results - page 1532 / 1742
» Learning Subjective Language
Sort
View
CCS
2005
ACM
15 years 10 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
CCS
2005
ACM
15 years 10 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
172
Voted
CCS
2005
ACM
15 years 10 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
CLEF
2005
Springer
15 years 10 months ago
CLEF-2005 CL-SR at Maryland: Document and Query Expansion Using Side Collections and Thesauri
This paper reports results for the University of Maryland’s participation in CLEF-2005 Cross-Language Speech Retrieval track. Techniques that were tried include: (1) document ex...
Jianqiang Wang, Douglas W. Oard
EMSOFT
2005
Springer
15 years 10 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
« Prev « First page 1532 / 1742 Last » Next »