Sciweavers

1818 search results - page 239 / 364
» How users use access control
Sort
View
NIME
2005
Springer
138views Music» more  NIME 2005»
15 years 10 months ago
ESP: A Driving Interface for Expression Synthesis
In the Expression Synthesis Project (ESP), we propose a driving interface for expression synthesis. ESP aims to provide a compelling metaphor for expressive performance so as to m...
Elaine Chew, Alexandre R. J. François, Jie ...
POLICY
2004
Springer
15 years 9 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
EUROPAR
2004
Springer
15 years 9 months ago
Large-Scale Deployment in P2P Experiments Using the JXTA Distributed Framework
The interesting properties of P2P systems (high availability despite peer volatility, support for heterogeneous architectures, high scalability, etc.) make them attractive for dist...
Gabriel Antoniu, Luc Bougé, Mathieu Jan, S&...
SOUPS
2005
ACM
15 years 10 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
CCS
2006
ACM
15 years 8 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang