Sciweavers

744 search results - page 66 / 149
» The Traust Authorization Service
Sort
View
ETFA
2005
IEEE
15 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
AIED
2005
Springer
15 years 3 months ago
Making Learning Design Standards Work with an Ontology of Educational Theories
In this paper, we present an ontology of educational theories their relation to learning design. This ontology takes into account learning design (LD) specifications such as OUNL-E...
Valéry Psyché, Jacqueline Bourdeau, ...
ERCIMDL
2005
Springer
77views Education» more  ERCIMDL 2005»
15 years 3 months ago
SCOPE - A Generic Framework for XML Based Publishing Processes
One of the objectives of the Open Access movement is to establish institutional repositories at universities and other research institutions in order to support self-archiving. Alt...
Uwe Müller, Manuel Klatt
PPPJ
2004
ACM
15 years 3 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
ESORICS
2004
Springer
15 years 3 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...