Sciweavers

1627 search results - page 146 / 326
» On context in authorization policy
Sort
View
ECIS
2001
13 years 11 months ago
Managing academic electronic publishing: Six case studies
Academic publishing faces major challenges such as increasing costs and a reduced subscription base. Electronic publishing promises benefits and solutions to these and other chall...
Anat Hovav, Paul Gray
ADHOC
2007
91views more  ADHOC 2007»
13 years 10 months ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
ACJ
2006
85views more  ACJ 2006»
13 years 10 months ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
INTERACTIONS
1998
145views more  INTERACTIONS 1998»
13 years 10 months ago
A brief history of human-computer interaction technology
This article summarizes the historical development of major advances in humancomputer interaction technology, emphasizing the pivotal role of university research in the advancemen...
Brad A. Myers
INFOCOM
2009
IEEE
14 years 5 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...