Sciweavers

270 search results - page 8 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
COMPSAC
2001
IEEE
13 years 11 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
IEEEARES
2010
IEEE
14 years 2 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
SAINT
2007
IEEE
14 years 1 months ago
Reconfigurable Systems with a User-Centric Focus
Today's reconfigurable radio systems have several interesting functionalities ranging from traditional reconfigurable systems operating at the physical layer only to fully fl...
Giovanni Bartolomeo, Stefano Salsano, Nicola Blefa...
CCS
2008
ACM
13 years 9 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
EDBT
2002
ACM
246views Database» more  EDBT 2002»
14 years 7 months ago
Impact and Potential of User Profiles Used for Distributed Query Processing Based on Literature Services
Applying meta search systems is a suitable method to support the user if there are many different services. Due to information splitting strategies of literature services existing ...
Bethina Schmitt