Sciweavers

580 search results - page 13 / 116
» The Interaction of Access Control and Object-Orientation in ...
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen
CVHI
2007
13 years 9 months ago
E-learning Platform for Interactive Access to Multimedia Materials in Daisy Format
The Paper presents multimedia system for accessible distant education which consists of multimedia browser accessible for visually impaired people and content distribution streamin...
Piotr Brzoza
CL
2010
Springer
13 years 7 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
HCW
1998
IEEE
13 years 11 months ago
CCS Resource Management in Networked HPC Systems
CCS is a resource management system for parallel high-performance computers. At the user level, CCS provides vendor-independent access to parallel systems. At the system administr...
Axel Keller, Alexander Reinefeld
CHI
2010
ACM
14 years 2 months ago
Rethinking RFID: awareness and control for interaction with RFID systems
People now routinely carry radio frequency identification (RFID) tags – in passports, driver’s licenses, credit cards, and other identifying cards – where nearby RFID reader...
Nicolai Marquardt, Alex S. Taylor, Nicolas Villar,...