Sciweavers

811 search results - page 67 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
EICS
2009
ACM
14 years 3 months ago
Toward user interface virtualization: legacy applications and innovative interaction systems
Single-user, desktop-based computer applications are pervasive in our daily lives and work. The prospect of using these applications with innovative interaction systems, like mult...
Guillaume Besacier, Frédéric Vernier
CONCURRENCY
2010
127views more  CONCURRENCY 2010»
13 years 9 months ago
Formation of virtual organizations in grids: a game-theoretic approach
Applications require the composition of resources to execute in a grid computing environment. The Grid Service Providers (GSPs), the owners of the computational resources, must for...
Thomas E. Carroll, Daniel Grosu
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 9 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CA
2002
IEEE
14 years 1 months ago
Haptics Technologies and Cultural Heritage Applications
This article describes the architecture of the "Museum of Pure Form", a virtual reality system where the user can interact, through the senses of touch and sight, with d...
Massimo Bergamasco, Antonio Frisoli, Federico Barb...