Sciweavers

1627 search results - page 204 / 326
» On context in authorization policy
Sort
View
ICSOC
2005
Springer
14 years 3 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...
TGC
2005
Springer
14 years 3 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
TCS
2008
13 years 10 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
HUC
2010
Springer
13 years 8 months ago
Locaccino: a privacy-centric location sharing application
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researc...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
CHI
2009
ACM
14 years 10 months ago
Comparing usage of a large high-resolution display to single or dual desktop displays for daily work
With the ever increasing amount of digital information, users desire more screen real estate to process their daily computing work, and might well benefit from using a wallsize la...
Xiaojun Bi, Ravin Balakrishnan