Sciweavers

207 search results - page 16 / 42
» Extending the Services and the Accessibility of Community Ne...
Sort
View
SACMAT
2004
ACM
14 years 2 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete deļ¬nition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
ICDCSW
2002
IEEE
14 years 1 months ago
TWSAPI: A Generic Teamwork Services Application Programming Interface
One of the problems faced by large, global organizations and enterprises is to effectively enable their employees to collaborate across locations. People need collaborative work s...
Engin Kirda, Gerald Reif, Harald Gall, Pascal Fenk...
ICDE
2009
IEEE
119views Database» more  ICDE 2009»
14 years 10 months ago
SmallBlue: Social Network Analysis for Expertise Search and Collective Intelligence
SmallBlue is a social networking application that unlocks the valuable business intelligence of 'who knows what?', 'who knows whom?' and `who knows what about w...
Ching-Yung Lin, Nan Cao, Shixia Liu, Spiros Papadi...
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
CCS
2009
ACM
14 years 3 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. proļ¬le information). To address this, servic...
Jessica Staddon