Sciweavers

580 search results - page 11 / 116
» The Interaction of Access Control and Object-Orientation in ...
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
EMISA
2009
Springer
14 years 2 months ago
Access Control for Monitoring System-Spanning Business Processes in Proviado
: Integrated process support is highly desirable in environments where data related to a particular (business) process are scattered over distributed, heterogeneous information sys...
Sarita Bassil, Manfred Reichert, Ralph Bobrik
INTERACT
2003
13 years 8 months ago
Drag-and-Pop and Drag-and-Pick: Techniques for Accessing Remote Screen Content on Touch- and Pen-Operated Systems
Abstract: Drag-and-pop and drag-and-pick are interaction techniques designed for users of pen- and touchoperated display systems. They provide users with access to screen content t...
Patrick Baudisch, Edward Cutrell, Mary Czerwinski,...
COMCOM
2006
121views more  COMCOM 2006»
13 years 7 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
AIMSA
2008
Springer
14 years 1 months ago
A Logical Approach to Dynamic Role-Based Access Control
Since its formalization RBAC has become the yardstick for the evaluation of access control formalisms. In order to meet organizational needs, it has been extended along several di...
Philippe Balbiani, Yannick Chevalier, Marwa El Hou...