Sciweavers

1627 search results - page 120 / 326
» On context in authorization policy
Sort
View
PERCOM
2007
ACM
14 years 10 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
ICSEA
2007
IEEE
14 years 4 months ago
Design and Development Tools for Next Generation Mobile Services
The actual standards for service authoring, composition and development are not easy to port and to apply for next generation mobile applications. This paper describes some tools ...
Giovanni Bartolomeo, Casalicchio Casalicchio, Stef...
NLDB
2010
Springer
14 years 2 months ago
Identifying Writers' Background by Comparing Personal Sense Thesauri
Analysis of blogpost writings is an important and growing research area. Both objective and subjective characteristics of a writer are detected. Words have word meaning that is com...
Polina Panicheva, John Cardiff, Paolo Rosso
CORR
2006
Springer
121views Education» more  CORR 2006»
13 years 10 months ago
Use of UML and Model Transformations for Workflow Process Definitions
Currently many different modeling languages are used for workflow definitions in BPM systems. Authors of this paper analyze the two most popular graphical languages, with highest p...
Audris Kalnins, Valdis Vitolins
USS
2008
14 years 29 days ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger