Sciweavers

882 search results - page 140 / 177
» On the Negotiation of Access Control Policies
Sort
View
SIS
2007
13 years 9 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
CHI
1995
ACM
13 years 11 months ago
A Virtual Window on Media Space
The Virtual Window system uses head movements in a local office to control camera movement in a remote office. The result is like a window allowing exploration of remote scenes ra...
William W. Gaver, Gerda Smets, Kees Overbeeke
GRID
2008
Springer
13 years 8 months ago
Market-oriented Grids and Utility Computing: The State-of-the-art and Future Directions
Traditional resource management techniques (resource allocation, admission control and scheduling) have been found to be inadequate for many shared Grid and distributed systems th...
James Broberg, Srikumar Venugopal, Rajkumar Buyya
CHI
2009
ACM
14 years 8 months ago
Timing is everything?: the effects of timing and placement of online privacy indicators
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make pr...
Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor...
CCS
2010
ACM
14 years 2 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu