Sciweavers

670 search results - page 45 / 134
» A RBAC-Based Policy Information Base
Sort
View
GRID
2007
Springer
14 years 5 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
CCS
2007
ACM
14 years 5 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
SIGUCCS
2000
ACM
14 years 2 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
IFIP12
2009
13 years 8 months ago
Automated Product Pricing Using Argumentation
This paper describes an argumentation-based approach for automating the decision making process of an autonomous agent for pricing products. Product pricing usually involves differ...
Nikolaos I. Spanoudakis, Pavlos Moraitis
COMCOM
2006
78views more  COMCOM 2006»
13 years 10 months ago
Personalization of internet telephony services for presence with SIP and extended CPL
This paper discusses issues of personalization of presence services in the context of Internet Telephony. Such services take into consideration the willingness and ability of a use...
Dongmei Jiang, Ramiro Liscano, Luigi Logrippo