Sciweavers

2061 search results - page 248 / 413
» Authorization for Metacomputing Applications
Sort
View
CCS
2009
ACM
16 years 5 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
CCS
2009
ACM
16 years 5 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CHI
2009
ACM
16 years 5 months ago
Comparing usage of a large high-resolution display to single or dual desktop displays for daily work
With the ever increasing amount of digital information, users desire more screen real estate to process their daily computing work, and might well benefit from using a wallsize la...
Xiaojun Bi, Ravin Balakrishnan
CHI
2009
ACM
16 years 5 months ago
Finding canonical behaviors in user protocols
While the collection of behavioral protocols has been common practice in human-computer interaction research for many years, the analysis of large protocol data sets is often extr...
Walter C. Mankowski, Peter Bogunovich, Ali Shokouf...
CHI
2009
ACM
16 years 5 months ago
From interaction to trajectories: designing coherent journeys through user experiences
The idea of interactional trajectories through interfaces has emerged as a sensitizing concept from recent studies of tangible interfaces and interaction in museums and galleries....
Steve Benford, Gabriella Giannachi, Boriana Koleva...