Sciweavers

1627 search results - page 150 / 326
» On context in authorization policy
Sort
View
FC
2001
Springer
97views Cryptology» more  FC 2001»
14 years 2 months ago
Monotone Signatures
In many real-life situations, massive quantities of signatures have to be issued on cheap passive supports (e.g. paper-based) such as bank-notes, badges, ID cards, driving licenses...
David Naccache, David Pointcheval, Christophe Tyme...
CANDC
2005
ACM
14 years 9 days ago
The amateur creator
Important design problems are raised in developing software for amateur users, a group distinguished here from novices. The authors argue that these design problems can be approac...
Stephen Boyd Davis, Magnus Moar
CHI
2005
ACM
14 years 10 months ago
Privacy gradients: exploring ways to manage incidental information during co-located collaboration
This research introduces privacy issues related to the viewing of incidental information during co-located collaboration. Web browsers were the representative application used in ...
Kirstie Hawkey, Kori M. Inkpen
CSCW
2010
ACM
14 years 7 months ago
Invisible emotion: information and interaction in an emergency room
Emotions are an often overlooked aspect of work since they are not included in formal work models. However, they continue provide critical information as well as be part of a rich...
Helena M. Mentis, Madhu Reddy, Mary Beth Rosson
ECOOP
2000
Springer
14 years 2 months ago
A Basic Model of Typed Components
This paper studies specific language level abstractions for component-based programming. We propose a simple model which captures some basic ingredients — like explicit context ...
João Costa Seco, Luís Caires