Sciweavers

936 search results - page 50 / 188
» Context for Ubiquitous Data Management
Sort
View
ACSAC
2003
IEEE
14 years 3 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
CONTEXT
2007
Springer
14 years 4 months ago
Risk Context Effects in Inductive Reasoning: An Experimental and Computational Modeling Study
Mechanisms that underlie the inductive reasoning process in risk contexts are investigated. Experimental results indicate that people rate the same inductive reasoning argument dif...
Kayo Sakamoto, Masanori Nakagawa
CP
2010
Springer
13 years 9 months ago
Context-Sensitive Call Control Using Constraints and Rules
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
HT
1997
ACM
14 years 2 months ago
As We Should Have Thought
The hypermedia field has long realized the need for firstructural abstractions. However, we have failed to generalize the concept of ubiquitous structure management to problem dom...
Peter J. Nürnberg, John J. Leggett, Erich R. ...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 4 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu