Sciweavers

1688 search results - page 102 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
118
Voted
VRML
1997
ACM
15 years 8 months ago
Using VRML to Access Manufacturing Data
This paper describes the use of the Virtual Reality Modeling Language (VRML) in the VIM - Visual Interface to Manufacturing system. The VIM prototype demonstrates the technical fe...
Sandy Ressler, Qiming Wang, Scott Bodarky, Charles...
SACMAT
2006
ACM
15 years 10 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
144
Voted
WIAS
2010
102views more  WIAS 2010»
15 years 3 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
PERVASIVE
2005
Springer
15 years 10 months ago
Analysis of Built-in Mobile Phone Sensors for Supporting Interactions with the Real World
There is currently a lot of research going on in the field of mobile interaction with the real world. So far, the environment where the mobile phone is used is mainly perceived as...
Karin Leichtenstern, Alexander De Luca, Enrico Ruk...
SACMAT
2003
ACM
15 years 10 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng