Sciweavers

1688 search results - page 76 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
CCS
2009
ACM
16 years 5 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
SPAA
1997
ACM
15 years 8 months ago
Accessing Nearby Copies of Replicated Objects in a Distributed Environment
Consider a set of shared objects in a distributed network, where several copies of each object may exist at any given time. To ensure both fast access to the objects as well as e ...
C. Greg Plaxton, Rajmohan Rajaraman, Andréa...
COMGEO
2010
ACM
15 years 7 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
PERVASIVE
2006
Springer
15 years 4 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
TEI
2009
ACM
120views Hardware» more  TEI 2009»
15 years 11 months ago
W41K: digitally augmenting traditional game environments
Augmented game environments use unobtrusively embedded technology to augment traditional games with virtual information and novel interaction capabilities. This article establishe...
Steve Hinske, Marc Langheinrich