Sciweavers

1627 search results - page 33 / 326
» On context in authorization policy
Sort
View
COLING
1994
13 years 9 months ago
Perspectives of DBMT for monolingual authors on the basis of LIDIA-1, an implemented mock-up
DBMT is researched here in the context of future systems for the general public, where a monolingual author wants to translate into several languages. We have produced a complete ...
Hervé Blanchon
ICALT
2005
IEEE
14 years 1 months ago
Authoring Educational Topic Maps: Can We Make It Easier?
In this paper we examine some problems related to capturing the structure and the topic name space of learning content in the context of Topic Map authoring. We demonstrate that t...
Darina Dicheva, Christo Dichev
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 7 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
CCS
2007
ACM
14 years 1 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
SWS
2004
ACM
14 years 1 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang