Sciweavers

599 search results - page 112 / 120
» Managing Privacy in LBAC Systems
Sort
View
CCS
2008
ACM
13 years 9 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
OOPSLA
2007
Springer
14 years 1 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
CHI
2005
ACM
14 years 7 months ago
Listening in: practices surrounding iTunes music sharing
This paper presents a descriptive account of the social practices surrounding the iTunes music sharing of 13 participants in one organizational setting. Specifically, we character...
Amy Voida, Rebecca E. Grinter, Nicolas Ducheneaut,...
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
14 years 2 months ago
Engaging the Periphery for Visual Communication on Mobile Phones
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...
OOPSLA
2007
Springer
14 years 1 months ago
Software speculative multithreading for Java
We apply speculative multithreading to sequential Java programs in software to achieve speedup on existing multiprocessors. A common speculation library supports both Java bytecod...
Christopher J. F. Pickett