Sciweavers

1627 search results - page 105 / 326
» On context in authorization policy
Sort
View
WWW
2010
ACM
14 years 5 months ago
Exploiting social context for review quality prediction
Online reviews in which users publish detailed commentary about their experiences and opinions with products, services, or events are extremely valuable to users who rely on them ...
Yue Lu, Panayiotis Tsaparas, Alexandros Ntoulas, L...
IPM
2002
86views more  IPM 2002»
13 years 10 months ago
Traditional IR for web users: a context for general audience digital libraries
The emergence of general audience digital libraries (GADLs) defines a context that represents a hybrid of both ``traditional'' IR, using primarily bibliographic resource...
Dietmar Wolfram, Hong (Iris) Xie
EKAW
2006
Springer
14 years 2 months ago
Role Organization Model in Hozo
The establishment of a computational framework of roles contributes effectively to the management of instance models because it provides us with a useful policy for treatment of vi...
Eiichi Sunagawa, Kouji Kozaki, Yoshinobu Kitamura,...
COMMA
2008
14 years 6 days ago
Modelling Judicial Context in Argumentation Frameworks
Abstract. Much work using argumnentation frameworks treats arguments as enbstract, related by a uniform attack relation which always succeeds unless the attacker can itself be defe...
Adam Zachary Wyner, Trevor J. M. Bench-Capon
SACMAT
2004
ACM
14 years 4 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...