Sciweavers

1479 search results - page 5 / 296
» Management without (Detailed) Models
Sort
View
ICONFERENCE
2012
12 years 4 months ago
No forests without trees: particulars and patterns in visualizing personal communication
When people use visualizations of conversational archives, they typically reflect on particular events, rather than patterns of activity over time. We explore whether this is a fu...
Ou Jie Zhao, Tiffany Ng, Dan Cosley
CSFW
2009
IEEE
14 years 21 days ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers
ACISICIS
2010
IEEE
13 years 10 months ago
New Interface Using Palm and Fingertip without Marker for Ubiquitous Environment
We developed new interactive display system called the palm display. Our prototype system shows the image of graphical user interface on the palm and allows the user to have intera...
Seokhwan Kim, Shin Takahashi, Jiro Tanaka
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
14 years 3 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...