Sciweavers

192 search results - page 26 / 39
» The Architecture of a Privacy-Aware Access Control Decision ...
Sort
View
UIST
1997
ACM
14 years 24 days ago
CyberDesk: A Framework for Providing Self-Integrating Ubiquitous Software Services
Current software suites suffer from problems due to poor integration of their individual tools. They require the designer to think of all possible integrating behaviours and leave...
Anind K. Dey, Gregory D. Abowd, Mike Pinkerton, An...
ENTCS
2007
112views more  ENTCS 2007»
13 years 8 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
CIDR
2011
252views Algorithms» more  CIDR 2011»
13 years 5 days ago
Hyder - A Transactional Record Manager for Shared Flash
Hyder supports reads and writes on indexed records within classical multi-step transactions. It is designed to run on a cluster of servers that have shared access to a large pool ...
Philip A. Bernstein, Colin W. Reid, Sudipto Das
ICST
2009
IEEE
14 years 3 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
MATA
2004
Springer
101views Communications» more  MATA 2004»
14 years 1 months ago
Mobile Tourist Guide Services with Software Agents
Applications for mobile devices have some restrictions because of the limited capabilities and heterogeneity of these devices. However, their communication capabilities allow the d...
Juan Pavón, Juan M. Corchado, Jorge J. G&oa...