Sciweavers

3605 search results - page 72 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
LOCA
2009
Springer
14 years 2 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
WOWMOM
2005
ACM
98views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Intuitive Human Governance of Autonomic Pervasive Computing Environments
This paper proposes an intuitive configuration tool for autonomic pervasive computing systems. Specifically the paper presents a system for the inference of user task intentions f...
Tony O'Donnell, David Lewis, Vincent Wade
MIDDLEWARE
2004
Springer
14 years 1 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
CCS
2006
ACM
13 years 11 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
14 years 1 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell