Sciweavers

1818 search results - page 165 / 364
» How users use access control
Sort
View
ERCIMDL
2006
Springer
174views Education» more  ERCIMDL 2006»
13 years 11 months ago
Using MILOS to Build a Multimedia Digital Library Application: The PhotoBook Experience
Abstract. The digital library field is recently broadening its scope of applicability and it is also continuously adapting to the frequent changes occurring in the internet society...
Giuseppe Amato, Paolo Bolettieri, Franca Debole, F...
AAAI
2006
13 years 11 months ago
Using Anticipation to Create Believable Behaviour
Although anticipation is an important part of creating believable behaviour, it has had but a secondary role in the field of life-like characters. In this paper, we show how a sim...
Carlos Martinho, Ana Paiva
OTM
2007
Springer
14 years 3 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
SWS
2004
ACM
14 years 3 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
ACSAC
2000
IEEE
14 years 2 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao