Sciweavers

4445 search results - page 219 / 889
» Reflective Authorization Systems
Sort
View
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 9 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
MM
1997
ACM
77views Multimedia» more  MM 1997»
15 years 9 months ago
Constraints for the Web
Constraints can be used to specify declaratively the desired layout of a web document. We present a system architecture in which both the author and the viewer can impose page lay...
Alan Borning, Richard Kuang-Hsu Lin, Kim Marriott
143
Voted
ERCIMDL
2000
Springer
98views Education» more  ERCIMDL 2000»
15 years 8 months ago
Personal Data in a Large Digital Library
The RePEc Economics library offers the largest distributed source of freely downloadable scientific research reports in the world. RePEc also contains details about Economics inst...
José Manuel Barrueco Cruz, Markus J. R. Kli...
USENIX
2003
15 years 6 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
WWW
2004
ACM
16 years 5 months ago
Dynamic search in peer-to-peer networks
This work* specifically addresses the search issues in unstructured peer-to-peer (P2P) systems that involve the design of an efficient search algorithm, the proposed dynamic searc...
Hsinping Wang, Tsungnan Lin, Chia Hung Chen, Yenna...