Sciweavers

1627 search results - page 73 / 326
» On context in authorization policy
Sort
View
GI
2003
Springer
14 years 2 months ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
RTCSA
2005
IEEE
14 years 3 months ago
A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems
Context aware middleware infrastructures have traditionally been implemented with a modular approach to allow different components to work cooperatively and supply context synthes...
Saad Liaquat Kiani, Maria Riaz, Yonil Zhung, Sungy...
CHI
2004
ACM
14 years 10 months ago
Context photography: modifying the digital camera into a new creative tool
Context photography consists of capturing context when taking a picture, by sensing physical input in addition to light and representing it visually in real time. By developing th...
Sara Ljungblad, Maria Håkansson, Lalya Gaye,...
ECIS
2004
13 years 11 months ago
Context Engineering: An IS Development Research Agenda
The authors present the Context Engineering (CE) approach to Information Systems Development (ISD) as a framework to organise ideas about previous development experience and to gu...
Licinio Roque, Ana Almeida, António Dias de...
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 9 months ago
Informed stego-systems in active warden context: statistical undetectability and capacity
Several authors have studied stego-systems based on Costa scheme, but just a few ones gave both theoretical and experimental justifications of these schemes performance in an activ...
Sofiane Braci, Claude Delpha, Rémy Boyer, G...