Sciweavers

744 search results - page 12 / 149
» The Traust Authorization Service
Sort
View
ISCC
2005
IEEE
15 years 3 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
WISE
2002
Springer
15 years 2 months ago
Towards Translating Authorizations for Transformed XML Documents
Web based services and applications have increased the availability and accessibility of information. XML has recently emerged as an important standard in the area of information ...
Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko K...
MOBILITY
2009
ACM
15 years 2 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
14 years 9 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
73
Voted
WWW
2002
ACM
15 years 10 months ago
Authoring and annotation of web pages in CREAM
Richly interlinked, machine-understandable data constitute the basis for the Semantic Web. We provide a framework, CREAM, that allows for creation of metadata. While the annotatio...
Siegfried Handschuh, Steffen Staab