Sciweavers

401 search results - page 9 / 81
» Dynamic security context management in Grid-based applicatio...
Sort
View
DATE
2004
IEEE
113views Hardware» more  DATE 2004»
13 years 11 months ago
Dynamic Memory Management Design Methodology for Reduced Memory Footprint in Multimedia and Wireless Network Applications
New portable consumer embedded devices must execute multimedia and wireless network applications that demand extensive memory footprint. Moreover, they must heavily rely on Dynami...
David Atienza, Stylianos Mamagkakis, Francky Catth...
IDTRUST
2009
ACM
14 years 2 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
SACMAT
2003
ACM
14 years 24 days ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
JODS
2007
142views Data Mining» more  JODS 2007»
13 years 7 months ago
Context Dependency Management in Ontology Engineering: A Formal Approach
Abstract. A viable ontology engineering methodology requires supporting domain experts in gradually building and managing increasingly complex versions of ontological elements and ...
Pieter De Leenheer, Aldo de Moor, Robert Meersman
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Context Bindings in Pervasive Middleware
Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usag...
Tom Broens, Marten van Sinderen, Aart van Halteren...