Sciweavers

4445 search results - page 27 / 889
» Reflective Authorization Systems
Sort
View
ENTCS
2008
130views more  ENTCS 2008»
13 years 10 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
ISMAR
2009
IEEE
14 years 4 months ago
In-place 3D sketching for authoring and augmenting mechanical systems
We present a framework for authoring three-dimensional virtual scenes for Augmented Reality (AR) which is based on hand sketching. Sketches consisting of multiple components are u...
Oriel Bergig, Nate Hagbi, Jihad El-Sana, Mark Bill...
JSW
2007
124views more  JSW 2007»
13 years 9 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
FLAIRS
2008
14 years 5 days ago
Problem Posing in AnimalWatch: An Interactive System for Student-Authored Content
Bringing users into the process of content development may help to reduce the time and cost associated with tutoring system development, and may benefit users by deepening their u...
Mike Birch, Carole R. Beal
JIIS
2002
118views more  JIIS 2002»
13 years 9 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...