Sciweavers

5494 search results - page 1000 / 1099
» E-services Management Requirements
Sort
View
105
Voted
SACMAT
2009
ACM
15 years 7 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
99
Voted
SACMAT
2009
ACM
15 years 7 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
93
Voted
SOUPS
2009
ACM
15 years 7 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
106
Voted
WIKIS
2009
ACM
15 years 7 months ago
Herding the cats: the influence of groups in coordinating peer production
Peer production systems rely on users to self-select appropriate tasks and “scratch their personal itch”. However, many such systems require significant maintenance work, whic...
Aniket Kittur, Bryan A. Pendleton, Robert E. Kraut
121
Voted
CGO
2008
IEEE
15 years 7 months ago
Automatic array inlining in java virtual machines
Array inlining expands the concepts of object inlining to arrays. Groups of objects and arrays that reference each other are placed consecutively in memory so that their relative ...
Christian Wimmer, Hanspeter Mössenböck
« Prev « First page 1000 / 1099 Last » Next »