Sciweavers

1627 search results - page 110 / 326
» On context in authorization policy
Sort
View
CCS
2008
ACM
14 years 22 days ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ICMCS
2006
IEEE
102views Multimedia» more  ICMCS 2006»
14 years 4 months ago
An Embedded Suggestive Interface for Making Home Videos
This paper describes a novel suggestive interface embedded in a smart camera prototype aimed at aiding home movie makers. We focus on the problem of generating shot capture sugges...
Brett Adams, Svetha Venkatesh
AINA
2006
IEEE
14 years 4 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
ICAC
2005
IEEE
14 years 4 months ago
Self-Configuring and Optimizing Mobile Ad Hoc Networks
We present the design and implementation of a working system that enables self-configuration and self-optimization in mobile ad hoc networks (MANETs) by exploiting context awarene...
Apostolos Malatras, George Pavlou, Stylianos Gouve...
FSEN
2007
Springer
14 years 4 months ago
Regulating Data Exchange in Service Oriented Applications
We define a type system for COWS, a formalism for specifying and combining services, while modelling their dynamic behaviour. Our types permit to express policies constraining dat...
Alessandro Lapadula, Rosario Pugliese, Francesco T...