Sciweavers

16843 search results - page 26 / 3369
» On Generalized Authorization Problems
Sort
View
ECAL
2003
Springer
14 years 1 months ago
Building a Hybrid Society of Mind Using Components from Ten Different Authors
Building large complex minds is difficult because we do not understand what the necessary components are or how they should interact. Even if the components were known it is diffic...
Ciarán O'Leary, Mark Humphrys
PERCOM
2004
ACM
14 years 7 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
KDD
2003
ACM
146views Data Mining» more  KDD 2003»
14 years 8 months ago
Style mining of electronic messages for multiple authorship discrimination: first results
This paper considers the use of computational stylistics for performing authorship attribution of electronic messages, addressing categorization problems with as many as 20 differ...
Shlomo Argamon, Marin Saric, Sterling Stuart Stein
WWW
2004
ACM
14 years 8 months ago
Specifying Semantic Email Processes
Prior work has shown that semantic email processes (SEPs) can be an effective tool for automating emailmediated tasks that are currently performed manually in a tedious, time-cons...
Luke McDowell, Oren Etzioni, Alon Y. Halevy
AINA
2007
IEEE
14 years 2 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...