Sciweavers

464 search results - page 30 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
RBAC
1997
135views more  RBAC 1997»
14 years 11 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
ECIS
2000
14 years 11 months ago
Katsir: A Framework for Harvesting Digital Libraries on the Web
Abstract-The information era has brought with it the wellknown problem of 'Information Explosion'. There are many and varied search engines on the Internet but it is stil...
Uri Hanani, Ariel J. Frank
VRCAI
2009
ACM
15 years 4 months ago
Context aware, multimodal, and semantic rendering engine
Nowadays, several techniques exist to render digital content such as graphics, audio, haptic, etc. Unfortunately, they require different faculties that cannot always be applied, e...
Patrick Salamin, Daniel Thalmann, Fréd&eacu...
IEEESCC
2007
IEEE
15 years 4 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
ADB
1994
311views Database» more  ADB 1994»
15 years 2 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle