Sciweavers

1627 search results - page 30 / 326
» On context in authorization policy
Sort
View
EOR
2010
55views more  EOR 2010»
13 years 7 months ago
A queueing model for general group screening policies and dynamic item arrivals
The second author is a Postdoctoral Fellow with the Fund for Scientific Research, Flanders (F.W.O.-Vlaanderen), Belgium. 1
Dieter Claeys, Joris Walraevens, Koenraad Laevens,...
JCS
2006
118views more  JCS 2006»
13 years 7 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla
MOBILITY
2009
ACM
14 years 7 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
EUROPKI
2007
Springer
14 years 1 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
AIED
2009
Springer
14 years 6 days ago
Evaluating an Authoring Tool for Mini-Dialogs
In order to facilitate efficient creation of instructional content for high proficiency language learning systems, we investigate the use of utterance templates through an intuitiv...
Rohit Kumar, Alicia Sagae, W. Lewis Johnson