Sciweavers

1627 search results - page 25 / 326
» On context in authorization policy
Sort
View
ATAL
2003
Springer
14 years 23 days ago
Self-Organizing Referral Networks: A Process View of Trust and Authority
Abstract. We are developing a decentralized approach to trust based on referral systems, where agents adaptively give referrals to one another to find other trustworthy agents. In...
Pinar Yolum, Munindar P. Singh
ETRICS
2006
13 years 11 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
W4A
2006
ACM
14 years 1 months ago
Contextual web accessibility - maximizing the benefit of accessibility guidelines
We argue that while work to optimize the accessibility of the World Wide Web through the publication and dissemination of a range of guidelines is of great importance, there is al...
David Sloan, Andy Heath, Fraser Hamilton, Brian Ke...
ACSAC
1999
IEEE
13 years 12 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
ECIR
2010
Springer
13 years 9 months ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang