Sciweavers

126 search results - page 5 / 26
» Centrality in Policy Network Drawings
Sort
View
POLICY
2007
Springer
14 years 1 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
POLICY
2004
Springer
14 years 25 days ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
FC
1998
Springer
96views Cryptology» more  FC 1998»
13 years 11 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
APVIS
2007
13 years 9 months ago
Visualization and analysis of email networks
This paper presents various methods for visualization and analysis of email networks; visualization on the surface of a sphere to reveal communication patterns between different g...
Xiaoyan Fu, Seok-Hee Hong, Nikola S. Nikolov, Xiao...
WWW
2005
ACM
14 years 8 months ago
Adaptive query routing in peer web search
An unstructured peer network application was proposed to address the query forwarding problem of distributed search engines and scalability limitations of centralized search engin...
Le-Shin Wu, Ruj Akavipat, Filippo Menczer