Sciweavers

1109 search results - page 129 / 222
» Middleware for User Controlled Environments
Sort
View
ACMDIS
2008
ACM
13 years 11 months ago
Constructivism, virtual reality and tools to support design
This paper describes a process for creating a design tool, which is based in constructivism. The process is described for the creation of a tool to help novices in designing virtu...
Cara Winterbottom, Edwin H. Blake
SACMAT
2009
ACM
14 years 3 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
IEEEARES
2010
IEEE
14 years 4 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
CCS
2007
ACM
14 years 3 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
CORR
2004
Springer
127views Education» more  CORR 2004»
13 years 9 months ago
Monitoring, Analyzing, and Controlling Internet-scale Systems with ACME
Analyzing and controlling large distributed services under a wide range of conditions is difficult. Yet these capabilities are essential to a number of important development and o...
David L. Oppenheimer, Vitaliy Vatkovskiy, Hakim We...