Sciweavers

232 search results - page 4 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
DISCEX
2003
IEEE
14 years 4 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
ICALT
2010
IEEE
13 years 11 months ago
Continuous Use of Authoring for Adaptive Educational Hypermedia: A Long-term Case Study
—Adaptive educational hypermedia allows lessons to be personalized according to the needs of the learner. However, to achieve this, content must be split into stand-alone fragmen...
Jonathan G. K. Foss, Alexandra I. Cristea, Maurice...
UIST
2005
ACM
14 years 4 months ago
DocWizards: a system for authoring follow-me documentation wizards
Traditional documentation for computer-based procedures is difficult to use: readers have trouble navigating long complex instructions, have trouble mapping from the text to displ...
Lawrence D. Bergman, Vittorio Castelli, Tessa A. L...
SACMAT
2006
ACM
14 years 4 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SACMAT
2003
ACM
14 years 4 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel