Sciweavers

164 search results - page 18 / 33
» On the Incoherencies in Web Browser Access Control Policies
Sort
View
WWW
2004
ACM
14 years 8 months ago
Adapting databases and WebDAV protocol
The ability of the Web to share data regardless of geographical location raises a new issue called remote authoring. With the Internet and Web browsers being independent of hardwa...
Bita Shadgar, Ian Holyer
CSE
2009
IEEE
14 years 2 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
IIR
2010
13 years 5 months ago
Social Approach to Context-Aware Retrieval
In this paper we present a general purpose solution to Web content perusal by means of mobile devices, named Social Context-Aware Browser. This is a novel approach for the informa...
Luca Vassena
WECWIS
2009
IEEE
198views ECommerce» more  WECWIS 2009»
14 years 2 months ago
Bridging the Gap between User Attributes and Service Policies with Attribute Mapping
—People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the...
Davide Cerri, Francesco Corcoglioniti
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...