Sciweavers

1818 search results - page 89 / 364
» How users use access control
Sort
View
DIM
2005
ACM
13 years 11 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
SECON
2010
IEEE
13 years 7 months ago
A Two-Tier Market for Decentralized Dynamic Spectrum Access in Cognitive Radio Networks
Market mechanisms have been exploited as important means for spectrum acquisition and access in cognitive radio networks. In this paper, we propose a two-tier market for decentrali...
Dan Xu, Xin Liu, Zhu Han
COOPIS
2003
IEEE
14 years 2 months ago
Providing a Progressive Access to Awareness Information
Awareness has now become a widely accepted central feature in groupware systems. In this context, providing an awareness support consists in delivering to users involved in a colla...
Manuele Kirsch-Pinheiro, Marlène Villanova-...
WETICE
2005
IEEE
14 years 2 months ago
Data access optimization on grid systems
— The execution of data intensive grid applications still raises several questions regarding job scheduling, data migration and replication. The optimization techniques applied b...
László Csaba Lorincz, Tamás K...
EGITALY
2006
13 years 10 months ago
Easy Access to Huge 3D Models of Works of Art
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...