Sciweavers

744 search results - page 82 / 149
» The Traust Authorization Service
Sort
View
CIMCA
2005
IEEE
14 years 12 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
SEC
2008
14 years 11 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
FGCS
2008
107views more  FGCS 2008»
14 years 10 months ago
Dynamic security context management in Grid-based applications
This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de ...
JDCTA
2008
160views more  JDCTA 2008»
14 years 10 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
HICSS
2005
IEEE
169views Biometrics» more  HICSS 2005»
15 years 3 months ago
Developing E-Government Integrated Infrastructures: A Case Study
The Public Domain (PD) always serves as an agent to provide better and reliable services and information to citizens. Recent advancements in technology, citizen-demand and new pub...
Marinos Themistocleous, Zahir Irani, Peter E. D. L...