Sciweavers

427 search results - page 21 / 86
» Policies: Giving Users Control over Calls
Sort
View
UIST
1997
ACM
14 years 2 months ago
The MetaDESK: Models and Prototypes for Tangible User Interfaces
The metaDESK is a user interface platform demonstrating new interaction techniques we call “tangible user interfaces.” We explore the physical instantiation of interface eleme...
Brygg Ullmer, Hiroshi Ishii
ESORICS
2000
Springer
14 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
SACMAT
2009
ACM
14 years 4 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
SGAI
2004
Springer
14 years 3 months ago
Implementing Policy Management through BDI
The requirement for Grid middleware to be largely transparent to individual users and at the same time act in accordance with their personal needs is a difficult challenge. In e-...
Simon Miles, Juri Papay, Michael Luck, Luc Moreau
SOSP
2007
ACM
14 years 6 months ago
AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications
The rise of the software-as-a-service paradigm has led to the development of a new breed of sophisticated, interactive applications often called Web 2.0. While web applications ha...
Emre Kiciman, V. Benjamin Livshits