Sciweavers

744 search results - page 8 / 149
» The Traust Authorization Service
Sort
View
IQ
2007
14 years 11 months ago
An Alert Management Approach To Data Quality: Lessons Learned From The Visa Data Authority Program
: We introduce an end-to-end framework for data quality that integrates business strategy, data quality models, and supporting investigative and governance processes. We also descr...
Joseph Bugajski, Robert L. Grossman
EOR
2011
111views more  EOR 2011»
14 years 4 months ago
On the distribution of the number stranded in bulk-arrival, bulk-service queues of the M/G/1 form
Bulk-arrival queues with single servers that provide bulk service are widespread in the real world, e.g., elevators in buildings, people-movers in amusement parks, air-cargo deliv...
Aykut F. Kahraman, Abhijit Gosavi
JSW
2008
101views more  JSW 2008»
14 years 9 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
POLICY
2007
Springer
15 years 3 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
ICWS
2003
IEEE
14 years 11 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti