Sciweavers

1627 search results - page 136 / 326
» On context in authorization policy
Sort
View
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
14 years 11 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...
CCS
2006
ACM
14 years 2 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
CHI
2009
ACM
14 years 11 months ago
Codex: a dual screen tablet computer
The Codex is a dual-screen tablet computer, about the size of a 4"x6" day planner, with a self-supporting binding and embedded sensors. The device can be oriented in a v...
François Guimbretière, Ken Hinckley,...
AI
2009
Springer
14 years 5 months ago
Machine Translation of Legal Information and Its Evaluation
This paper presents the machine translation system known as TransLI (Translation of Legal Information) developed by the authors for automatic translation of Canadian Court judgment...
Atefeh Farzindar, Guy Lapalme
OZCHI
2006
ACM
14 years 4 months ago
Using a scenario-planning tool to support an engaging online user experience
This paper describes a pilot project to research the use of a dynamic visual interface as the basis of a scenarioplanning tool. We introduce ‘flow’ as a theoretical framework ...
Jon M. Pearce, John Murphy, David Patman