Sciweavers

1627 search results - page 60 / 326
» On context in authorization policy
Sort
View
FGCS
2008
107views more  FGCS 2008»
13 years 7 months ago
Dynamic security context management in Grid-based applications
This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de ...
CSCW
2011
ACM
13 years 2 months ago
Creating a context of trust with ICTs: restoring a sense of normalcy in the environment
This paper reports on an ethnographic study of the technology-enabled behavior that took place amongst a citizen population living in a conflict zone. We interviewed 65 Iraqi citi...
Bryan Semaan, Gloria Mark
BROADNETS
2004
IEEE
13 years 11 months ago
Policy-Based Hybrid Hierarchical Optical Networks
This document presents provisioning strategies for emerging hybrid optical networks. The idea is to make use of policy-based management that guides the behavior of a network throu...
Belkacem Daheb, Wissam Fawaz, Olivier Audouin, Bel...
CSCW
2011
ACM
13 years 2 months ago
(Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context
This paper describes a qualitative study of how 11 Arab individuals use technology in the context of their longdistance romantic relationships. Our participants’ communication p...
Tamara Alsheikh, Jennifer A. Rode, Siân E. L...
AH
2000
Springer
14 years 13 hour ago
ConTexts: Adaptable Hypermedia
ConTexts is an implementation of and proposed design model for an adaptable hypermedia system. ConTexts provides an easy yet powerful way to author the interactive, adaptable effec...
Monica M. C. Schraefel