Sciweavers

1147 search results - page 144 / 230
» Transformation of Access Rights
Sort
View
CSMR
1998
IEEE
14 years 1 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
ICDCS
1996
IEEE
14 years 1 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
ICIAP
1997
ACM
14 years 1 months ago
Image Retrieval by Color Regions
—A major research subject in image databases is to support efficient and effective access to images based on their visual content. In color image databases, this requires to sup...
Alberto Del Bimbo, Mauro Mugnaini, Pietro Pala, F....
IFIP
1993
Springer
14 years 1 months ago
Customization and Evolution of Process Models in EPOS
EPOS is a kernel software engineering environment, o ering integrated software con guration and process management. The EPOS process modeling PM support system runs on top of th...
Reidar Conradi, Maria Letizia Jaccheri
AINA
2007
IEEE
14 years 29 days ago
Fuzzy Recommendation towards QoS-Aware Pervasive Learning
Pervasive learning promises an exciting learning environment such that users can access content and study them at anytime, anywhere, through any devices. Besides delivering the ri...
Zhiwen Yu, Norman Lin, Yuichi Nakamura, Shoji Kaji...