Sciweavers

1627 search results - page 76 / 326
» On context in authorization policy
Sort
View
CCS
2011
ACM
12 years 9 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
CHI
2010
ACM
14 years 4 months ago
On reconstruction of task context after interruption
Theoretical accounts of task resumption after interruption have almost exclusively argued for resumption as a primarily memory-based process. In contrast, for many task domains, r...
Dario D. Salvucci
CALCO
2005
Springer
126views Mathematics» more  CALCO 2005»
14 years 3 months ago
Context-Free Languages via Coalgebraic Trace Semantics
In this paper we identify context-free grammars as coalgebras. To obtain the associated context-free languages (consisting of only finite-length strings) we introduce a general a...
Ichiro Hasuo, Bart Jacobs
NORDICHI
2004
ACM
14 years 3 months ago
Place storming: performing new technologies in context
We present Place Storming, an original method of brainstorming technological concepts, particularly in the area of pervasive computing. Place Storming is contextdriven and play-ba...
Ken Anderson, Jane McGonigal
INFOCOM
2006
IEEE
14 years 3 months ago
Policy-Based Resource Management and Service Provisioning in GMPLS Networks
— Emerging network applications tend to be built over heterogeneous network resources spanning multiple management domains. Many such applications have dynamic demands for dedica...
Xi Yang, Tom Lehman, Chris Tracy, Jerry Sobieski, ...