Sciweavers

16843 search results - page 87 / 3369
» On Generalized Authorization Problems
Sort
View
XMLSEC
2003
ACM
14 years 1 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
ITS
2010
Springer
145views Multimedia» more  ITS 2010»
14 years 29 days ago
Eliciting Informative Feedback in Peer Review: Importance of Problem-Specific Scaffolding
In a controlled experiment using Comrade, a computer-supported peer review system, student reviewers offered feedback to student authors on their written analyses of a problem scen...
Ilya M. Goldin, Kevin D. Ashley
NDSS
1999
IEEE
14 years 14 days ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
JACM
2002
122views more  JACM 2002»
13 years 7 months ago
Cosmological lower bound on the circuit complexity of a small problem in logic
An exponential lower bound on the circuit complexity of deciding the weak monadic second-order theory of one successor (WS1S) is proved. Circuits are built from binary operations, ...
Larry J. Stockmeyer, Albert R. Meyer
HM
2007
Springer
120views Optimization» more  HM 2007»
14 years 2 months ago
On the Combination of Constraint Programming and Stochastic Search: The Sudoku Case
Sudoku is a notorious logic-based puzzle that is popular with puzzle enthusiasts the world over. From a computational perspective, Sudoku is also a problem that belongs to the set ...
Rhydian Lewis