Sciweavers

4445 search results - page 68 / 889
» Reflective Authorization Systems
Sort
View
CHI
2006
ACM
14 years 10 months ago
An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation
Much existing documentation is informal and serves to communicate "how-to" knowledge among restricted working groups. Using current practices, such documentation is both...
Madhu Prabaker, Lawrence D. Bergman, Vittorio Cast...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
DLS
2007
133views Languages» more  DLS 2007»
14 years 1 months ago
Mirages: behavioral intercession in a mirror-based architecture
Mirror-based systems are object-oriented reflective architectures built around a set of design principles that lead to reflective APIs which foster a high degree of reusability, l...
Stijn Mostinckx, Tom Van Cutsem, Stijn Timbermont,...
SACMAT
2010
ACM
14 years 2 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
ECHT
1992
14 years 2 months ago
SEPIA: A Cooperative Hypermedia Authoring Environment
In this paper, we report about the design, development, and implementation of the SEPIA cooperative hypermedia authoring environment. It provides results on the following aspects ...
Norbert A. Streitz, Jörg M. Haake, Jörg ...