Sciweavers

2560 search results - page 176 / 512
» Securing VO Management
Sort
View
FC
2009
Springer
121views Cryptology» more  FC 2009»
15 years 11 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
ICDCSW
2005
IEEE
15 years 10 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
WIKIS
2005
ACM
15 years 10 months ago
SmallWiki: a meta-described collaborative content management system
Wikis are often implemented using string-based approaches to parse and generate their pages. While such approaches work well for simple wikis, they hamper the customization and ad...
Stéphane Ducasse, Lukas Renggli, Roel Wuyts
142
Voted
IFIP
2004
Springer
15 years 10 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
CLEIEJ
2007
86views more  CLEIEJ 2007»
15 years 5 months ago
Requirements Game: Teaching Software Project Management
: Several business areas, like Management and Negotiation, have used games like a didactic way to simulate world reality, to introduce students to the day-to-day generated problems...
Carlos Mario Zapata Jaramillo, Gabriel Awad-Aubad