Sciweavers

4445 search results - page 79 / 889
» Reflective Authorization Systems
Sort
View
JSS
2006
112views more  JSS 2006»
13 years 11 months ago
Generalized comparison of graph-based ranking algorithms for publications and authors
Citation analysis helps in evaluating the impact of scientific collections (journals and conferences), publications and scholar authors. In this paper we examine known algorithms ...
Antonis Sidiropoulos, Yannis Manolopoulos
ICTAI
2009
IEEE
14 years 5 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SAINT
2002
IEEE
14 years 4 months ago
Implementation and Evaluation of Authorized Access LAN Sockets Using PPPoE
This paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. W...
Hideo Masuda, Michio Nakanishi, Masahide Nakamura,...
SCHULE
1997
Springer
14 years 3 months ago
Authoring on the Fly
In the presentation recording scenario there are two aspects regarding the user interface: How the recording is done (i.e., how the presenter or his/her assistants have to interac...
Christian Bacher, Rainer Müller, Thomas Ottma...
JSW
2007
106views more  JSW 2007»
13 years 11 months ago
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...