Sciweavers

468 search results - page 54 / 94
» The System Administration Maturity Model - SAMM
Sort
View
POPL
2005
ACM
14 years 1 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
CAISE
2006
Springer
13 years 11 months ago
A Framework for the Behavior Based Integration of Business Processes
Abstract. We propose a meta-meta framework architecture for supporting the behavior based integration of two business processes. The meta-meta level provides basic integration oper...
Georg Grossmann, Michael Schrefl, Markus Stumptner
ARESEC
2011
110views more  ARESEC 2011»
12 years 8 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 1 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
14 years 1 months ago
A Practical Approach for Microscopy Imaging Data Management (MIDM) in Neuroscience
Current data management approaches can easily handle the relatively simple requirements for molecular biology research but not the more varied and sophisticated microscopy imaging...
Shenglan Zhang, Xufei Qian, Amarnath Gupta, Maryan...