Sciweavers

4445 search results - page 2 / 889
» Reflective Authorization Systems
Sort
View
SIGDOC
1999
ACM
13 years 10 months ago
Role-based access control in online authoring and publishing systems vs. document hierarchy
How to structure diverse (documentation) information sources of an enterprise and how to arrange a workflow with access control are two important issues for online authoring and p...
Zhongdong Zhang, Ernst Georg Haffner, Andreas Heue...
IFIP
1994
Springer
13 years 10 months ago
Reflections on Security of Database and Datatransfer Systems in Health Care
Health care is a complex and transnational task of societies. The various institutions and individuals involved are not and should not be governed by one central authority, but ha...
Joachim Biskup, Gerrit Bleumer
IFIP
2000
Springer
13 years 10 months ago
Representing Human and Non-human Stakeholders: On Speaking with Authority
Information systems research is concerned with complex imbroglios of human and non-human components. As researchers, we need ways to represent the intricacies of the different sta...
Athanasia Pouloudi, Edgar A. Whitley
CHI
2008
ACM
14 years 6 months ago
Designing for bystanders: reflections on building a public digital forum
In this paper, we reflect on the design and deployment process of MAGICBoard, a public display deployed in a university setting that solicits the electronic votes and opinions of ...
Anthony Tang, Matthias Finke, Michael Blackstock, ...
ESORICS
2010
Springer
13 years 7 months ago
An Authorization Framework Resilient to Policy Evaluation Failures
Abstract. In distributed computer systems, it is possible that the evaluation of an authorization policy may suffer unexpected failures, perhaps because a sub-policy cannot be eval...
Jason Crampton, Michael Huth