Sciweavers

708 search results - page 123 / 142
» Implementing access control to people location information
Sort
View
ICDCS
1999
IEEE
13 years 12 months ago
Beyond the Black Box: Event-based Inter-Process Communication in Process Support Systems
Existing workflow management systems encapsulate the data and behavior of a process within its execution scope, preventing other processes from accessing this information until th...
Claus Hagen, Gustavo Alonso
ESWS
2008
Springer
13 years 9 months ago
xOperator - Interconnecting the Semantic Web and Instant Messaging Networks
Instant Messaging (IM) is in addition to Web and Email the most popular service on the Internet. With xOperator we present a strategy and implementation which deeply integrates Ins...
Sebastian Dietzold, Jörg Unbehauen, Söre...
USS
2004
13 years 9 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
TSD
2010
Springer
13 years 5 months ago
Embedded Speech Recognition in UPnP (DLNA) Environment
In the past decade great technological advances have been made in internet services, personal computers, telecommunications, media and entertainment. Many of these advances have be...
Jozef Ivanecký, Radek Hampl
CCS
2007
ACM
14 years 1 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder