Sciweavers

270 search results - page 29 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
EUROSSC
2006
Springer
14 years 13 days ago
Context-Aware Trust Domains
Context-aware service platforms need to establish and manage trust relationships for users to know if the user's privacy policies are being enforced and for service providers ...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
ICC
2009
IEEE
171views Communications» more  ICC 2009»
13 years 6 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
COMPSAC
2007
IEEE
14 years 21 days ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
CHI
2005
ACM
14 years 9 months ago
Sticky widgets: pseudo-haptic widget enhancements for multi-monitor displays
People use multiple monitors to increase their display surface and to facilitate multitasking. However, if windows are maximized to fill one screen, users may have difficulties ac...
Regan L. Mandryk, Malcolm E. Rodgers, Kori M. Inkp...
VLDB
1990
ACM
126views Database» more  VLDB 1990»
14 years 24 days ago
Consistency of Versions in Object-Oriented Databases
This paper presents an approach to maintaining consistency of object versions in multiversion database systems. In this approach a multiversion database is considered to be a set ...
Wojciech Cellary, Geneviève Jomier