Sciweavers

650 search results - page 54 / 130
» Privacy in Non-private Environments
Sort
View
ACSAC
2000
IEEE
15 years 2 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
AGENTS
2000
Springer
15 years 2 months ago
Dynamically altering agent behaviors using natural language instructions
Smart avatars are virtual human representations controlled by real people. Given instructions interactively, smart avatars can act as autonomous or reactive agents. During a real-...
Rama Bindiganavale, William Schuler, Jan M. Allbec...
ACSAC
1999
IEEE
15 years 2 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
ACSAC
1999
IEEE
15 years 2 months ago
Transactions in Java Card
A smart card runtime environment must provide the proper transaction support for the reliable update of data, especially on multiapplication cards like the Java Card. The transact...
Marcus Oestreicher
OOPSLA
1999
Springer
15 years 2 months ago
Mostly-copying Reachability-based Orthogonal Persistence
We describe how reachability-based orthogonal persistence can be supported even in uncooperative implementations of languages such as C++ and Modula-3, and without modification t...
Antony L. Hosking, Jiawan Chen