Sciweavers

1627 search results - page 185 / 326
» On context in authorization policy
Sort
View
CHI
2010
ACM
14 years 5 months ago
OneBusAway: results from providing real-time arrival information for public transit
Public transit systems play an important role in combating traffic congestion, reducing carbon emissions, and promoting compact, sustainable urban communities. The usability of p...
Brian Ferris, Kari Watkins, Alan Borning
CHI
2010
ACM
14 years 5 months ago
Communicating software agreement content using narrative pictograms
This paper presents narrative pictograms, diagrams designed to convey the abstract concepts of a software agreement. Narrative pictograms arose out of a need to increase the chanc...
Matthew Kay, Michael Terry
SACMAT
2009
ACM
14 years 4 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
ACSAC
2007
IEEE
14 years 4 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
ICSEA
2007
IEEE
14 years 4 months ago
An Access Control Metamodel for Web Service-Oriented Architecture
— With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web ...
Christian Emig, Frank Brandt, Sebastian Abeck, J&u...