Sciweavers

315 search results - page 35 / 63
» Specifying multimedia access control using RDF
Sort
View
CCS
2000
ACM
13 years 11 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
CAISE
2010
Springer
13 years 7 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
CONTEXT
2005
Springer
14 years 28 days ago
Context-Dependent and Epistemic Uses of Attention for Perceptual-Demonstrative Identification
Object identification via a perceptual-demonstrative mode of presentation has been studied in cognitive science as a particularly direct and context-dependent means of identifying ...
Nicolas J. Bullot
IEEEARES
2007
IEEE
14 years 1 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
CHI
2009
ACM
14 years 8 months ago
The VoiceBot: a voice controlled robot arm
We present a system whereby the human voice may specify continuous control signals to manipulate a simulated 2D robotic arm and a real 3D robotic arm. Our goal is to move towards ...
Brandi House, Jonathan Malkin, Jeff Bilmes