Sciweavers

4445 search results - page 110 / 889
» Reflective Authorization Systems
Sort
View
121
Voted
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 4 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
MOC
2000
181views more  MOC 2000»
15 years 3 months ago
Newton's method for overdetermined systems of equations
Abstract. Complexity theoretic aspects of continuation methods for the solution of square or underdetermined systems of polynomial equations have been studied by various authors. I...
Jean-Pierre Dedieu, Mike Shub
TKDE
2008
177views more  TKDE 2008»
15 years 4 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
ICALT
2005
IEEE
15 years 9 months ago
Goal Oriented Personalisation with SCORM
This paper presents an innovative approach to personalize on-line content to the needs of individual learners. We use a regular educational environment, the BlackboardTM Learning ...
Guillermo Power, Hugh C. Davis, Alexandra I. Crist...
NDSS
2002
IEEE
15 years 9 months ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...