Sciweavers

705 search results - page 115 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
CSCW
2010
ACM
15 years 6 months ago
The work of sustaining order in wikipedia: the banning of a vandal
In this paper, we examine the social roles of software tools in the English-language Wikipedia, specifically focusing on autonomous editing programs and assisted editing tools. Th...
R. Stuart Geiger, David Ribes
ETELEMED
2009
IEEE
164views Healthcare» more  ETELEMED 2009»
14 years 7 months ago
Research Challenges for Achieving Healthcare Business Process Interoperability
- E-Health systems' interoperability constitutes one of the main challenges of the IT society. E-Health interoperability will not occur without a shared policy and a process f...
Dimitrios Alexandrou, Gregoris Mentzas
SACMAT
2009
ACM
15 years 4 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
XMLSEC
2003
ACM
15 years 2 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
SIGUCCS
2003
ACM
15 years 2 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah