Sciweavers

16843 search results - page 27 / 3369
» On Generalized Authorization Problems
Sort
View
CCS
2010
ACM
14 years 2 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SIGDOC
2005
ACM
14 years 1 months ago
Metadata based authoring for technical documentation
The creation process of technical documentation is an expensive and time-consuming task especially for complex products. To make this process more cost-efficient computerized supp...
Ingo Stock, Michael Weber, Eckhard Steinmeier
IUI
2003
ACM
14 years 1 months ago
Supporting plan authoring and analysis
Interactive tools to help users author plans or processes are essential in a variety of domains. KANAL helps users author sound plans by simulating them, checking for a variety of...
Jihie Kim, Jim Blythe
SOUPS
2010
ACM
13 years 12 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
SIGIR
2008
ACM
13 years 8 months ago
Separate and inequal: preserving heterogeneity in topical authority flows
Web pages, like people, are often known by others in a variety of contexts. When those contexts are sufficiently distinct, a page's importance may be better represented by mu...
Lan Nie, Brian D. Davison