Sciweavers

6137 search results - page 44 / 1228
» Securing Collaborative Applications
Sort
View
CDVE
2006
Springer
160views Visualization» more  CDVE 2006»
13 years 11 months ago
Automated Social Network Analysis for Collaborative Work
Inter-networked computers enable virtual collaborative work. In the course of interacting with one another, individuals send and receive messages and files of various sorts. This m...
Larry Korba, Ronggong Song, George Yee, Andrew S. ...
CHI
2004
ACM
14 years 8 months ago
Social and temporal structures in everyday collaboration
Everyday work frequently involves coordinating and collaborating with others, but the structure of collaboration is largely invisible to conventional desktop applications. We are ...
Danyel Fisher, Paul Dourish
ACSAC
1998
IEEE
13 years 12 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
IJCAT
2010
106views more  IJCAT 2010»
13 years 6 months ago
Fine grain associative feature reasoning in collaborative engineering
: This paper explores the vast domain of systematic collaborative engineering with reference to product lifecycle management approach from the angle of feature-level collaboration ...
Yong-Sheng Ma, C. H. Bong
USENIX
2007
13 years 10 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...