Sciweavers

1627 search results - page 59 / 326
» On context in authorization policy
Sort
View
HT
1993
ACM
13 years 11 months ago
Links in Hypermedia: The Requirement for Context
Taking the concept of a link from hypertext and adding to it the rich collection of information formats found in multimedia systems provides an extension to hypertext that is ofte...
Lynda Hardman, Dick C. A. Bulterman, Guido van Ros...
ICESS
2004
Springer
14 years 1 months ago
Selecting a Scheduling Policy for Embedded Real-Time Monitor and Control Systems
An integrated solution to guarantee real-time requirements in embedded real-time monitor and control systems is presented in this paper. First l task model is abstracted from such ...
Qingxu Deng, Mingsong Lv, Ge Yu
NORDICHI
2006
ACM
14 years 1 months ago
How ordinary internet users can have a chance to influence privacy policies
By ‘Obligation Management’ we refer to the definition, automated enforcement, and monitoring of privacy obligation policies. Privacy policies are nowadays found on most organi...
John Sören Pettersson, Simone Fischer-Hü...
GROUP
2007
ACM
13 years 11 months ago
Community, consensus, coercion, control: cs*w or how policy mediates mass participation
When large groups cooperate, issues of conflict and control surface because of differences in perspective. Managing such diverse views is a persistent problem in cooperative group...
Travis Kriplean, Ivan Beschastnikh, David W. McDon...
COMPSEC
2004
104views more  COMPSEC 2004»
13 years 7 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu