Sciweavers

220 search results - page 43 / 44
» Trusted business system model using context sensitiveness
Sort
View
HICSS
2003
IEEE
95views Biometrics» more  HICSS 2003»
14 years 26 days ago
Matching Needs - Application Service Providing for Asynchronous Learning Networks
Universities have severe difficulties in using elearning applications successfully due to organizational problems to provide them. Providing a web-based learning environment is an...
Wolf-Gideon Bleek, Iver Jackewitz, Bernd Pape
POLICY
2007
Springer
14 years 1 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
NSPW
2004
ACM
14 years 1 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
13 years 12 months ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
AAAI
2008
13 years 10 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...