Sciweavers

559 search results - page 84 / 112
» Dating example for information architecture
Sort
View
ATAL
2003
Springer
15 years 9 months ago
Role-assignment in open agent societies
Open systems are characterized by heterogeneous participants which can enter or leave the system at will. Typical examples are e-commerce applications or information agent systems...
Mehdi Dastani, Virginia Dignum, Frank Dignum
COOPIS
2002
IEEE
15 years 9 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
147
Voted
MKM
2009
Springer
15 years 8 months ago
Integrating Web Services into Active Mathematical Documents
Abstract. Active mathematical documents are distinguished from traditional paper-oriented ones by their ability to interactively adapt to a reader’s inputs. This includes changes...
Jana Giceva, Christoph Lange 0002, Florian Rabe
ICCS
2001
Springer
15 years 8 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
ICMCS
1994
IEEE
147views Multimedia» more  ICMCS 1994»
15 years 8 months ago
Supporting Temporal Multimedia Operations in Object-Oriented Database Systems
Advanced applications in fields like electronic publishing and telecooperation face the problem of handling multimedia information. Conventional database systems do not offer adeq...
Karl Aberer, Wolfgang Klas