Sciweavers

1472 search results - page 48 / 295
» Access control in virtual environments
Sort
View
PERCOM
2005
ACM
16 years 4 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
AAI
2005
93views more  AAI 2005»
15 years 4 months ago
Learning By Feeling: Evoking Empathy With Synthetic Characters
Virtual environments are now becoming a promising new technology to be used in the development of interactive learning environments for children. Perhaps triggered by the success ...
Ana Paiva, João Dias, Daniel Sobral, Ruth A...
ENTCS
2007
128views more  ENTCS 2007»
15 years 4 months ago
Rewriting-Based Access Control Policies
In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic ...
Anderson Santana de Oliveira
ICWN
2004
15 years 5 months ago
Congestion Control in a High Speed Radio Environment
This paper explores interactions between congestion control mechanisms at the transport layer and scheduling algorithms at the physical layer in the High-Speed Down-link Packet Acc...
Sara Landström, Lars-Åke Larzon, Ulf Bo...
USENIX
2003
15 years 5 months ago
The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0
We explore the requirements, design, and implementation of the TrustedBSD MAC Framework. The TrustedBSD MAC Framework, integrated into FreeBSD 5.0, provides a flexible framework ...
Robert Watson, Wayne Morrison, Chris Vance, Brian ...