Sciweavers

4445 search results - page 60 / 889
» Reflective Authorization Systems
Sort
View
ISORC
2007
IEEE
14 years 4 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon
CHI
2011
ACM
13 years 1 months ago
Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight
This is a critical design paper offering a possible scenario of use intended to provoke reflection about values and politics of design in persuasive computing. We describe the des...
Stephen Purpura, Victoria Schwanda, Kaiton William...
MATA
2005
Springer
146views Communications» more  MATA 2005»
14 years 3 months ago
Distributed Authorization Framework for Mobile Agents
Abstract. Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems ...
Guillermo Navarro, Jose A. Ortega-Ruiz, Joan Ametl...
VL
1996
IEEE
162views Visual Languages» more  VL 1996»
14 years 2 months ago
Interactive Authoring of Multimedia Documents
As multimedia applications spread widely, it is crucial for programming and design support systems to handle "time" in multimedia documents effectively and flexibly. This...
Junehwa Song, Michelle Y. Kim, G. Ramalingam, Raym...
AINA
2007
IEEE
14 years 4 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...