Sciweavers

1663 search results - page 304 / 333
» Privacy and Identity Management
Sort
View
SAC
2005
ACM
15 years 5 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
MSS
2003
IEEE
173views Hardware» more  MSS 2003»
15 years 5 months ago
Peabody: The Time Travelling Disk
Disk drives are now available with capacities on the order of hundreds of gigabytes. What has not become available is an easy way to manage storage. With installed machines locate...
Charles B. Morrey III, Dirk Grunwald
ELPUB
1998
ACM
15 years 4 months ago
The Library in the Card: Results from Decomate Project and Current Developments at UAB
The Library in the card is the slogan which would summarize the aims of the Univeritat Autonoma de Barcelona (UAB) Library Service in its involvement in several EC Libraries Progr...
Nuria Gallart
BMCBI
2008
115views more  BMCBI 2008»
14 years 12 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...
ESWA
2007
176views more  ESWA 2007»
14 years 11 months ago
Credit scoring with a data mining approach based on support vector machines
The credit card industry has been growing rapidly recently, and thus huge numbers of consumers’ credit data are collected by the credit department of the bank. The credit scorin...
Cheng-Lung Huang, Mu-Chen Chen, Chieh-Jen Wang