Sciweavers

393 search results - page 66 / 79
» Implementing Role Based Access Control for Federated Informa...
Sort
View
HICSS
2008
IEEE
175views Biometrics» more  HICSS 2008»
14 years 1 months ago
Service-Oriented Resource Management
Service Management controls how business services are developed and delivered to customers. Business services must be flexible negotiable between customer and provider. Temporal a...
Jürgen Dorn, Hannes Werthner
DIM
2009
ACM
14 years 1 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
CCS
2009
ACM
14 years 21 hour ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
DL
1998
Springer
180views Digital Library» more  DL 1998»
13 years 11 months ago
Automatic Subject Indexing Using an Associative Neural Network
The global growth in popularity of the World Wide Web has been enabled in part by the availability of browser based search tools which in turn have led to an increased demand for ...
Yi-Ming Chung, William M. Pottenger, Bruce R. Scha...
NDSS
2000
IEEE
13 years 11 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...