Sciweavers

936 search results - page 50 / 188
» Context for Ubiquitous Data Management
Sort
View
ACSAC
2003
IEEE
15 years 10 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
153
Voted
CONTEXT
2007
Springer
15 years 11 months ago
Risk Context Effects in Inductive Reasoning: An Experimental and Computational Modeling Study
Mechanisms that underlie the inductive reasoning process in risk contexts are investigated. Experimental results indicate that people rate the same inductive reasoning argument dif...
Kayo Sakamoto, Masanori Nakagawa
CP
2010
Springer
15 years 3 months ago
Context-Sensitive Call Control Using Constraints and Rules
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
HT
1997
ACM
15 years 9 months ago
As We Should Have Thought
The hypermedia field has long realized the need for firstructural abstractions. However, we have failed to generalize the concept of ubiquitous structure management to problem dom...
Peter J. Nürnberg, John J. Leggett, Erich R. ...
216
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 11 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu