Sciweavers

744 search results - page 21 / 149
» The Traust Authorization Service
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
SCFBM
2008
143views more  SCFBM 2008»
14 years 9 months ago
LSID Tester, a tool for testing Life Science Identifier resolution services
Background: Life Science Identifiers (LSIDs) are persistent, globally unique identifiers for biological objects. The decentralised nature of LSIDs makes them attractive for identi...
Roderic D. M. Page
CHI
2011
ACM
14 years 1 months ago
Informing decisions: how people use online rating information to make choices
In this paper we investigate how people use online rating information to inform decision making. We examine whether a theory of searching for information to discriminate between a...
Stelios Lelis, Andrew Howes
GRID
2004
Springer
15 years 3 months ago
Implementation and Evaluation of a ReplicaSet Grid Service
We present the implementation and performance of a ReplicaSet service based on the specification developed in the OGSA Data Replication Services (OREP) Working Group of the Global...
Mary Manohar, Ann L. Chervenak, Ben Clifford, Carl...
WEBI
2004
Springer
15 years 3 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen