Sciweavers

422 search results - page 32 / 85
» Risk management for distributed authorization
Sort
View
COLCOM
2009
IEEE
15 years 5 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
IEEEPACT
2008
IEEE
15 years 7 months ago
Multi-optimization power management for chip multiprocessors
The emergence of power as a first-class design constraint has fueled the proposal of a growing number of run-time power optimizations. Many of these optimizations trade-off power...
Ke Meng, Russ Joseph, Robert P. Dick, Li Shang
ACMSE
2008
ACM
15 years 2 months ago
Optimization of the multiple retailer supply chain management problem
With stock surpluses and shortages representing one of the greatest elements of risk to wholesalers, a solution to the multiretailer supply chain management problem would result i...
Caio Soares, Gerry V. Dozier, Emmett Lodree, Jared...
102
Voted
SACMAT
2009
ACM
15 years 7 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
EGC
2005
Springer
15 years 6 months ago
Ticket-Based Grid Services Architecture for Dynamic Virtual Organizations
A Virtual Organization (VO) in the Grid is a collection of users and distributed resources, in which resources are shared by users. VOs are dynamically created for some goals and t...
Byung Joon Kim, Kyong Hoon Kim, Sung Je Hong, Jong...