Sciweavers

744 search results - page 24 / 149
» The Traust Authorization Service
Sort
View
SIMPRA
2011
14 years 4 months ago
Virtual segment: Store-carry-forward relay-based support for wide-area non-real-time data exchange
—In the Internet of the future, a flexible, dynamic combination of wireless and wired access networks is expected to be a key driver for enlarging the broadband communication se...
Shinya Yamamura, Akira Nagata, Masato Tsuru, Hitom...
TKDE
2008
177views more  TKDE 2008»
14 years 9 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
ECIS
2001
14 years 11 months ago
Information markets to improve information value and utilisation
The Internet and Intranet reduce much of the costs of information sharing, but they do not solve receivers' reading and interpretation limitations. Alternatively, browsers an...
Fons Wijnhoven
PST
2008
14 years 11 months ago
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System
To enable a rich attribute-based authorization system, it is desirable that a large number of user attributes are available, possibly provided by multiple entities. The user may b...
Apurva Mohan, Douglas M. Blough
DOCENG
2005
ACM
14 years 11 months ago
Integrating translation services within a structured editor
Fully automatic machine translation cannot produce high quality translation; Dialog-Based Machine Translation (DBMT) is the only way to provide authors with a means of translating...
Ali Choumane, Hervé Blanchon, Cécile...