Sciweavers

5790 search results - page 82 / 1158
» Distributed programming with distributed authorization
Sort
View
INTERACT
2007
13 years 10 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
ADCS
2004
13 years 10 months ago
Novel Group Awareness Mechanisms for Real-Time Collaborative Document Authoring
Group awareness has become important in improving the usability of real-time, distributed, collaborative writing systems. However, the current set of implemented awareness mechanis...
Gitesh K. Raikundalia, Hao Lan Zhang
ENTCS
2008
130views more  ENTCS 2008»
13 years 9 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
PERCOM
2004
ACM
14 years 8 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
ITCC
2002
IEEE
14 years 1 months ago
Bridging O-Telos and XML with XML Schema: the Authoring Environment for KBS Adaptive Hyperbook
KBS Adaptive Hyperbook is a framework designed for modeling, organizing, and maintaining distributed hypermedia resources on the Web with the purpose of supporting Web-based dista...
Changtao Qu, Wolfgang Nejdl