Sciweavers

1073 search results - page 21 / 215
» Secure context-sensitive authorization
Sort
View
WORDS
2003
IEEE
14 years 1 months ago
Middleware Support for Embedded Software with Multiple QoS Properties for Ubiquitous Computing Environments
Ubiquitous application software usually has multiple QoS requirements, such as situationawareness, real-time, and security, which make the application software development complic...
Stephen S. Yau, Yu Wang, Dazhi Huang
WMTE
2002
IEEE
14 years 21 days ago
Environmental Detectives: PDAs as a Window into a Virtual Simulated World
The use of computer simulations is changing the nature of scientific investigation and providing us unique insights into the way that the world works. As simulation moves from the...
Eric Klopfer, Kurt Squire, Henry Jenkins
ACSAC
2001
IEEE
13 years 11 months ago
A Framework for Multiple Authorization Types in a Healthcare Application System
In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tab...
Ramaswamy Chandramouli
SACMAT
2010
ACM
14 years 18 days ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
HPDC
2005
IEEE
14 years 1 months ago
The resource oriented authorization manager (ROAM)
The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible authorization system for the National Fusion Grid (FusionGrid). This system builds ...
Justin Burruss