Sciweavers

1363 search results - page 170 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
POPL
2004
ACM
15 years 11 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
PERCOM
2006
ACM
15 years 10 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
PERCOM
2005
ACM
15 years 10 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
IUI
2010
ACM
15 years 8 months ago
Speeding pointing in tiled widgets: understanding the effects of target expansion and misprediction
Target expansion is a pointing facilitation technique where the users target, typically an interface widget, is dynamically enlarged to speed pointing in interfaces. However, with...
Jaime Ruiz, Edward Lank
CSCW
2010
ACM
15 years 8 months ago
Eliciting and focusing geographic volunteer work
Open content communities such as wikis derive their value from the work done by users. However, a key challenge is to elicit work that is sufficient and focused where needed. We ...
Reid Priedhorsky, Mikhil Masli, Loren G. Terveen