Sciweavers

546 search results - page 50 / 110
» ADS as Information Management Service in an M-Learning Envir...
Sort
View
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
AINA
2010
IEEE
14 years 2 months ago
Context-Aware Mobile Services Transactions
— with the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable envir...
Muhammad Younas, Soraya Kouadri Mostéfaoui
DISCEX
2003
IEEE
14 years 2 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
ASPLOS
2006
ACM
14 years 3 months ago
Geiger: monitoring the buffer cache in a virtual machine environment
Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a...
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi ...
ICWS
2008
IEEE
13 years 10 months ago
A Trust Vector Approach to Service-Oriented Applications
Trust is a critical issue in e-commerce and e-service environments. In some applications (such as eBay), the trust management mechanisms have been introduced to provide valuable i...
Lei Li, Yan Wang 0002