Sciweavers

1627 search results - page 104 / 326
» On context in authorization policy
Sort
View
NDSS
2002
IEEE
14 years 3 months ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...
SICHERHEIT
2008
14 years 6 days ago
ConCert: Content Revocation Using Certificates
: Content reuse on the Web is becoming even more common since the Web 2.0 "phenomenon". However, each time content is reused certain information is either completely lost...
Henrich Christopher Pöhls
OOPSLA
2007
Springer
14 years 4 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley
ICSE
2008
IEEE-ACM
14 years 11 months ago
Testing pervasive software in the presence of context inconsistency resolution services
Pervasive computing software adapts its behavior according to the changing contexts. Nevertheless, contexts are often noisy. Context inconsistency resolution provides a cleaner pe...
Heng Lu, W. K. Chan, T. H. Tse
NETWORK
2008
107views more  NETWORK 2008»
13 years 10 months ago
HiCon: a hierarchical context monitoring and composition framework for next-generation context-aware services
This article presents a hierarchical context monitoring and composition framework that effectively supports next-generation context-aware services. The upcoming ubiquitous space w...
Kyungmin Cho, Inseok Hwang, Seungwoo Kang, Byoungj...