Sciweavers

744 search results - page 118 / 149
» The Traust Authorization Service
Sort
View
CHINZ
2007
ACM
15 years 1 months ago
Users dealing with spam and spam filters: some observations and recommendations
The email communication system is threatened by unsolicited commercial email aka spam. In response, spam filters have been deployed widely to help reduce the amount of spam users ...
Christopher Lueg, Sam Martin
ICCCN
2007
IEEE
15 years 1 months ago
Principles of IEEE 802.11s
In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) 802.11 Working Group (WG) led to the formation of Task Group (TG) "s". 802.11s develo...
Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Dent...
EKAW
2004
Springer
15 years 1 months ago
Towards a Knowledge-Aware Office Environment
The objective of the Semantic Web is to make the Web amenable to computer processing, and hence to improve the value that humans can obtain from it. One of the oft-touted user bene...
Les Carr, Timothy Miles-Board, Gary Wills, Arouna ...
FTDCS
2004
IEEE
15 years 1 months ago
Towards Supporting Fine-Grained Access Control for Grid Resources
The heterogeneous nature and independent administration of geographically dispersed resources in Grid, demand the need for access control using fine-grained policies. In this pape...
Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swa...
FLOPS
2006
Springer
15 years 1 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov