Sciweavers

20024 search results - page 3607 / 4005
» Database Management Systems
Sort
View
CCS
2004
ACM
15 years 10 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
147
Voted
MDM
2004
Springer
147views Communications» more  MDM 2004»
15 years 10 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
MHCI
2004
Springer
15 years 10 months ago
A Prototype for Remote Vehicle Diagnostics
Abstract. The field of Remote Vehicle Diagnostics can be described as the remote management of vehicles equipped with electronic control systems. Despite the great potential that i...
Jonas Kuschel, Henrik Fagrell, Carl Johan Andersso...
127
Voted
SEMWEB
2004
Springer
15 years 10 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin
SACMAT
2003
ACM
15 years 10 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
« Prev « First page 3607 / 4005 Last » Next »