Sciweavers

708 search results - page 15 / 142
» Implementing access control to people location information
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang
SC
2000
ACM
15 years 4 months ago
Computing and Data Grids for Science and Engineering
We use the term “Grid” to refer to a software system that provides uniform and location independent access to geographically and organizationally dispersed, heterogeneous reso...
William E. Johnston, Dennis Gannon, Bill Nitzberg,...
CNSR
2005
IEEE
15 years 5 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
MIDDLEWARE
2010
Springer
14 years 10 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
JWSR
2008
145views more  JWSR 2008»
14 years 11 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton