Sciweavers

270 search results - page 35 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
COMCOM
2000
148views more  COMCOM 2000»
14 years 9 months ago
Advanced service provisioning based on mobile agents
Service provisioning is currently a challenging issue to offer future telecommunication services efficiently and at the same time in a flexible and user friendly manner. As a cont...
Peyman Farjami, Carmelita Görg, Frank Bell
NORDICHI
2004
ACM
15 years 2 months ago
Facilitating user interface adaptation to mobile devices
One vision of a context-aware pervasive networking environment promises the user a seamless access to surrounding services using her personal mobile device. This requires that the...
Pertti Repo
ICDE
1993
IEEE
120views Database» more  ICDE 1993»
15 years 1 months ago
Adaptable Pointer Swizzling Strategies in Object Bases
In this article, different techniques for 'pointer swizzling" are classified and evaluated for optimizing the access to main-memory resident persistent objects. To speed ...
Alfons Kemper, Donald Kossmann
CHI
2005
ACM
15 years 10 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
SACMAT
2005
ACM
15 years 3 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang