Sciweavers

422 search results - page 14 / 85
» Risk management for distributed authorization
Sort
View
COMPSAC
2008
IEEE
14 years 2 months ago
Managing Libre Software Distributions under a Product Line Approach
Software product lines have already proven to be a successful methodology for building and maintaining a collection of similar software products, based on a common architecture. H...
Israel Herraiz, Gregorio Robles, Rafael Capilla, J...
PST
2004
13 years 9 months ago
Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation
The paper reports on ongoing research into the development of a management system to co-ordinate a set of activities of a virtual organisation for the production of chemicals. The...
Panayiotis Periorellis, Christopher J. W. Townson,...
MMS
2002
13 years 8 months ago
Dynamic end-to-end QoS management middleware for distributed multimedia systems
Abstract. In this paper, we present a separable, reusable middleware solution that provides coordinated, end-to-end QoS management over any type of service component, and can use e...
Denise J. Ecklund, Vera Goebel, Thomas Plagemann, ...
INTERACT
2007
13 years 10 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
PERCOM
2004
ACM
14 years 8 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles