Sciweavers

635 search results - page 45 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
ACSAC
2002
IEEE
14 years 18 days ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
VLDB
2002
ACM
122views Database» more  VLDB 2002»
13 years 7 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski
OOPSLA
1992
Springer
13 years 11 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
14 years 17 days ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
EWCBR
2004
Springer
14 years 1 months ago
PlayMaker: An Application of Case-Based Reasoning to Air Traffic Control Plays
When events such as severe weather or congestion interfere with the normal flow of air traffic, air traffic controllers may implement plays that reroute one or more traffic flows. ...
Kenneth R. Allendoerfer, Rosina Weber