Sciweavers

270 search results - page 28 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
DC
2001
13 years 9 months ago
Mixing and Mapping Metadata to Provide Integrated Access to Digital Library Collections: An Activity Report
This paper provides a report of work in progress to implement integrated access to multiple digital collections that are described using a variety of metadata formats. Using the e...
Karen Calhoun, Tom Turner, Meryl Brodsky, George K...
JUCS
2008
166views more  JUCS 2008»
13 years 7 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
IUI
2010
ACM
14 years 4 months ago
Personalized news recommendation based on click behavior
Online news reading has become very popular as the web provides access to news articles from millions of sources around the world. A key challenge of news websites is to help user...
Jiahui Liu, Peter Dolan, Elin Rønby Pederse...
CSFW
2006
IEEE
14 years 1 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
EUROSEC
2010
ACM
14 years 27 days ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...