Sciweavers

1587 search results - page 295 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
CBMS
2006
IEEE
15 years 3 months ago
Dorian: Grid Service Infrastructure for Identity Management and Federation
Identity management and federation is becoming an ever present problem in large multi-institutional environments. By their nature, Grids span multiple institutional administration...
Stephen Langella, Scott Oster, Shannon Hastings, F...
ASSETS
2006
ACM
15 years 3 months ago
Wireless headset communications for vision impaired persons in multi-User environments
Wireless headsets are a great asset to Vision Impaired Persons (VIP’s) as they prove to be much easier to use and reliable than wired equivalents. Radio based wireless headsets ...
Iain Murray, Andrew Pasquale
ISCC
2005
IEEE
15 years 3 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
JCDL
2004
ACM
106views Education» more  JCDL 2004»
15 years 3 months ago
Architecting an extensible digital repository
The Digital Collection and Archives (DCA) in partnership with Academic Technology (AT) at Tufts University developed a digital library solution for long-term storage and integrati...
Anoop Kumar, Ranjani Saigal, Robert Chavez, Nikola...
COMPSAC
2007
IEEE
15 years 1 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie