Sciweavers

1627 search results - page 78 / 326
» On context in authorization policy
Sort
View
SACMAT
2004
ACM
14 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
FLOPS
2006
Springer
14 years 1 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
AIIDE
2009
13 years 10 months ago
Evaluating the Authorial Leverage of Drama Management
A drama manager (DM) monitors an interactive experience, such as a computer game, and intervenes to shape the global experience so that it satisfies the author's expressive g...
Sherol Chen, Mark J. Nelson, Michael Mateas
CSCW
2011
ACM
13 years 4 months ago
Scheduling in variable-core collaborative systems
The performance of a collaborative system depends on how two mandatory collaborative tasks, processing and transmission of user commands, are scheduled. We have developed multiple...
Sasa Junuzovic, Prasun Dewan
VTC
2007
IEEE
110views Communications» more  VTC 2007»
14 years 3 months ago
Multi-Channel Radio Resource Distribution Policies in Heterogeneous Traffic Scenarios
—Multi-channel operation in wireless systems has been proposed to increase user throughput and reduce transmission delays. However, multi-channel operation requires adequate reso...
M. Carmen Lucas-Estan, Javier Gozálvez, Joa...