Sciweavers

4445 search results - page 66 / 889
» Reflective Authorization Systems
Sort
View
CHI
2005
ACM
14 years 10 months ago
Six themes of the communicative appropriation of photographic images
In this paper, we explore the use of digital photographs in computer-mediated communication. We present Lascaux, an instant messaging client that serves as a research platform for...
Amy Voida, Elizabeth D. Mynatt
CADE
2003
Springer
14 years 10 months ago
Foundational Certified Code in a Metalogical Framework
Foundational certified code systems seek to prove untrusted programs to be safe relative to safety policies given in terms of actual machine architectures, thereby improving the s...
Karl Crary, Susmit Sarkar
CSCW
2011
ACM
13 years 5 months ago
Virtual gifts and guanxi: supporting social exchange in a chinese online community
Significant cultural differences persist between East and West. Software systems that have been proven to operate efficiently within one culture can fail in the context of the oth...
Jiang Yang, Mark S. Ackerman, Lada A. Adamic
CCS
2010
ACM
14 years 4 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
HPDC
2007
IEEE
14 years 4 months ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov