Sciweavers

5790 search results - page 80 / 1158
» Distributed programming with distributed authorization
Sort
View
COLCOM
2007
IEEE
14 years 3 months ago
Unraveling decentralized authorization for multi-domain collaborations
Abstract—Current authorization solutions take highly case-bycase approaches. First of all, the solutions address particular types of multi-domain collaborations such as Virtual O...
Hannah K. Lee
COLCOM
2008
IEEE
14 years 3 months ago
Supporting Agile Development of Authorization Rules for SME Applications
Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still di...
Steffen Bartsch, Karsten Sohr, Carsten Bormann
ECIR
2010
Springer
13 years 10 months ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 1 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
ICASSP
2011
IEEE
13 years 23 days ago
Fast algorithm for beamforming problems in distributed communication of relay networks
A sequential quadratic programming (SQP) method is proposed to solve the distributed beamforming problem in multiple relay networks. The problem is formulated as the minimization ...
Cong Sun, Yaxiang Yuan