Sciweavers

49 search results - page 7 / 10
» On Modelling Access Policies: Relating Roles to their Organi...
Sort
View
CONTEXT
2005
Springer
14 years 2 months ago
Context-Dependent and Epistemic Uses of Attention for Perceptual-Demonstrative Identification
Object identification via a perceptual-demonstrative mode of presentation has been studied in cognitive science as a particularly direct and context-dependent means of identifying ...
Nicolas J. Bullot
ACSAC
2002
IEEE
14 years 1 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
ICSE
2001
IEEE-ACM
14 years 29 days ago
Engineering Mobile-Agent Applications via Context-Dependent Coordination
: The design and development of Internet applications, requiring dynamic and possibly mobile access to Internet resources, can take advantage of an approach based on autonomous mob...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
IEEEARES
2006
IEEE
14 years 2 months ago
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine
Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as...
Nevena Stolba, Marko Banek, A. Min Tjoa
CAISE
2010
Springer
13 years 8 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...