Sciweavers

4445 search results - page 129 / 889
» Reflective Authorization Systems
Sort
View
CSFW
2010
IEEE
15 years 8 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
AIED
2009
Springer
15 years 11 months ago
The Extensible Problem-Specific Tutor (xPST): Evaluation of an API for Tutoring on Existing Interfaces
The Extensible Problem-Specific Tutor (xPST) system was created to facilitate the creation of intelligent tutoring systems (ITSs) on existing software and web-based interfaces. Thi...
Stephen B. Gilbert, Stephen Blessing, Sateesh Koda...
SOCIALCOM
2010
15 years 2 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
ECOOPW
1999
Springer
15 years 8 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
ENTCS
2008
175views more  ENTCS 2008»
15 years 4 months ago
AGAPIA v0.1: A Programming Language for Interactive Systems and Its Typing System
A model (consisting of rv-systems), a core programming language (for developing rv-programs), several specification and analysis techniques appropriate for modeling, programming a...
Cezara Dragoi, Gheorghe Stefanescu