Sciweavers

490 search results - page 74 / 98
» Enabling User Control with Personal Identity Management
Sort
View
CSFW
1999
IEEE
15 years 4 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
JUCS
2008
129views more  JUCS 2008»
15 years 12 days ago
Easing the Smart Home: Semi-automatic Adaptation in Perceptive Environments
: This paper analyses the requirements of automation and adaptation in the so called perceptive environments. These environments are places with the ability of perceiving the conte...
Manuel García-Herranz, Pablo A. Haya, Abrah...
117
Voted
OHS
2001
Springer
15 years 4 months ago
Revisiting and Versioning in Virtual Special Reports
Adaptation/personalization is one of the main issues for web applications and require large repositories. Creating adaptive web applications from these repositories requires to hav...
Sébastien Iksal, Serge Garlatti
101
Voted
CCS
2005
ACM
15 years 6 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
SIGMETRICS
2011
ACM
191views Hardware» more  SIGMETRICS 2011»
14 years 3 months ago
Stability analysis of QCN: the averaging principle
Data Center Networks have recently caused much excitement in the industry and in the research community. They represent the convergence of networking, storage, computing and virtu...
Mohammad Alizadeh, Abdul Kabbani, Berk Atikoglu, B...