Sciweavers

270 search results - page 26 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
IADIS
2004
13 years 9 months ago
Enhancing educational metadata with digital rights information: the EMDIR web-based environment
Taking into account the constantly increasing number of educational resources available on the Web, the problem arising is to determine who is authorized to access these resources...
Symeon Chatzinotas, Pythagoras Karampiperis, Demet...
ESORICS
2008
Springer
13 years 9 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
ACSC
2009
IEEE
14 years 2 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 2 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
GI
2009
Springer
13 years 5 months ago
Introducing Community Single Sign-On for EDIT
: The European Distributed Institute of Taxonomy (EDIT) platform, as well as biodiversity providers in general, provides a multitude of web-based taxonomic applications and service...
Lutz Suhrbier