Sciweavers

1818 search results - page 218 / 364
» How users use access control
Sort
View
140
Voted
PPPJ
2006
ACM
15 years 11 months ago
Aranea: web framework construction and integration kit
Currently there exist dozens of web controller frameworks that are incompatible, but at the same time have large portions of overlapping functionality that is implemented over and...
Oleg Mürk, Jevgeni Kabanov
184
Voted
ASPLOS
2011
ACM
14 years 8 months ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...
NFM
2011
223views Formal Methods» more  NFM 2011»
14 years 12 months ago
opaal: A Lattice Model Checker
Abstract. We present a new open source model checker, opaal, for automatic verification of models using lattice automata. Lattice automata allow the users to incorporate abstracti...
Andreas Engelbredt Dalsgaard, René Rydhof H...
SACMAT
2009
ACM
15 years 11 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
ELPUB
2004
ACM
15 years 10 months ago
The need for sharing user-profiles in digital libraries
Personalization was a hype in the late 1990s. Several organizations offered (and are still offering) personalization services for their customers. From ecommerce applications we...
Harald Krottmaier