Sciweavers

4445 search results - page 56 / 889
» Reflective Authorization Systems
Sort
View
121
Voted
ECTEL
2007
Springer
15 years 9 months ago
Reflections on Digital Literacy
Parallel to the societal diffusion of digital technologies, the debate on their impacts and requirements has created terms like ICT literacy, digital literacy or digital competenc...
Harald Gapski
99
Voted
NETWORKING
2008
15 years 4 months ago
Designing Optimal iBGP Route-Reflection Topologies
The Border Gateway Protocol (BGP) is used today by all Autonomous Systems (AS) in the Internet. Inside each AS, iBGP sessions distribute the external routes among the routers. In l...
Marc-Olivier Buob, Steve Uhlig, Mickael Meulle
117
Voted
ATAL
2003
Springer
15 years 8 months ago
Self-Organizing Referral Networks: A Process View of Trust and Authority
Abstract. We are developing a decentralized approach to trust based on referral systems, where agents adaptively give referrals to one another to find other trustworthy agents. In...
Pinar Yolum, Munindar P. Singh
94
Voted
PERCOM
2005
ACM
16 years 2 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
108
Voted
EUROPKI
2007
Springer
15 years 9 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier