Sciweavers

2261 search results - page 58 / 453
» Dynamic types for authentication
Sort
View
POPL
2012
ACM
12 years 4 months ago
A type system for borrowing permissions
In object-oriented programming, unique permissions to object references are useful for checking correctness properties such as consistency of typestate and noninterference of conc...
Karl Naden, Robert Bocchino, Jonathan Aldrich, Kev...
CANDT
2009
14 years 23 days ago
The conference room as a toolbox: technological and social routines in corporate meeting spaces
HCI, CSCW, and ubicomp researchers have developed new technologies and interaction techniques to support collaboration, ranging from electronic whiteboards to software supporting ...
Christopher Plaue, John T. Stasko, Mark Baloga
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
14 years 10 months ago
Spatial Outsourcing for Location-based Services
- The embedding of positioning capabilities in mobile devices and the emergence of location-based applications have created novel opportunities for utilizing several types of multi...
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...
CHI
2005
ACM
14 years 9 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
JNW
2008
126views more  JNW 2008»
13 years 8 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe