Sciweavers

4118 search results - page 714 / 824
» Mechanisms for usage control
Sort
View
MOBIMEDIA
2007
15 years 5 months ago
Bayesian memory-based reputation system
Reputation System provides a way to maintain trust through social control by utilizing feedbacks about the service providers’ past behaviors. Conventional Memory-based Reputatio...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...
APBC
2004
163views Bioinformatics» more  APBC 2004»
15 years 5 months ago
A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery
The conserved sequences in gene regulatory regions dominate gene regulation. Discovering these sequences and their functions is important in post genome era. A novel model is cons...
Xiaoming Wu, Bo Wang, Changxin Song, Jingzhi Cheng
ACSW
2006
15 years 5 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
AVI
2006
15 years 5 months ago
Exploring visual feedback of change conflict in a distributed 3D environment
Teams that are geographically distributed often share information both in real-time and asynchronously. When such sharing is through groupware, change conflicts can arise when peo...
Mark S. Hancock, John David Miller, Saul Greenberg...
DBSEC
2001
129views Database» more  DBSEC 2001»
15 years 5 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu