Sciweavers

422 search results - page 14 / 85
» Risk management for distributed authorization
Sort
View
90
Voted
COMPSAC
2008
IEEE
15 years 7 months ago
Managing Libre Software Distributions under a Product Line Approach
Software product lines have already proven to be a successful methodology for building and maintaining a collection of similar software products, based on a common architecture. H...
Israel Herraiz, Gregorio Robles, Rafael Capilla, J...
100
Voted
PST
2004
15 years 1 months ago
Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation
The paper reports on ongoing research into the development of a management system to co-ordinate a set of activities of a virtual organisation for the production of chemicals. The...
Panayiotis Periorellis, Christopher J. W. Townson,...
147
Voted
MMS
2002
15 years 6 days ago
Dynamic end-to-end QoS management middleware for distributed multimedia systems
Abstract. In this paper, we present a separable, reusable middleware solution that provides coordinated, end-to-end QoS management over any type of service component, and can use e...
Denise J. Ecklund, Vera Goebel, Thomas Plagemann, ...
112
Voted
INTERACT
2007
15 years 1 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
105
Voted
PERCOM
2004
ACM
16 years 3 days ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles