Sciweavers

2061 search results - page 217 / 413
» Authorization for Metacomputing Applications
Sort
View
CHI
2004
ACM
16 years 5 months ago
Interviewing over instant messaging
Interviews are a cornerstone of human-computer interaction research. As a research method, they can both be deeply valuable and distinctly challenging. Pragmatic challenges of int...
Amy Voida, Elizabeth D. Mynatt, Thomas Erickson, W...
POPL
2004
ACM
16 years 5 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
ICSE
2007
IEEE-ACM
16 years 4 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
IUI
2010
ACM
16 years 1 months ago
Aspect-level news browsing: understanding news events from multiple viewpoints
Aspect-level news browsing provides readers with a classified view of news articles with different viewpoints. It facilitates active interactions with which readers easily discove...
Souneil Park, Sang Jeong Lee, Junehwa Song
IUI
2009
ACM
16 years 1 months ago
Subobject detection through spatial relationships on mobile phones
We present a novel image classification technique for detecting multiple objects (called subobjects) in a single image. In addition to image classifiers, we apply spatial relati...
Benjamin Brombach, Erich Bruns, Oliver Bimber