Sciweavers

807 search results - page 47 / 162
» Term Rewriting for Access Control
Sort
View
156
Voted
EUROSEC
2010
ACM
15 years 9 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
JHSN
2006
96views more  JHSN 2006»
15 years 3 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
129
Voted
GECCO
2008
Springer
130views Optimization» more  GECCO 2008»
15 years 4 months ago
Parsimony pressure made easy
The parsimony pressure method is perhaps the simplest and most frequently used method to control bloat in genetic programming. In this paper we first reconsider the size evolutio...
Riccardo Poli, Nicholas Freitag McPhee
123
Voted
CHI
2009
ACM
16 years 4 months ago
Fighting for control: children's embodied interactions when using physical and digital representations
Tabletop and tangible interfaces are often described in terms of their support for shared access to digital resources. However, it is not always the case that collaborators want t...
Paul Marshall, Rowanne Fleck, Amanda Harris, Joche...
MOBILITY
2009
ACM
15 years 8 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...