Sciweavers

4445 search results - page 723 / 889
» Reflective Authorization Systems
Sort
View
CHI
2010
ACM
15 years 10 months ago
Motivations to participate in online communities
A consistent theoretical and practical challenge in the design of socio-technical systems is that of motivating users to participate in and contribute to them. This study examines...
Cliff Lampe, Rick Wash, Alcides Velasquez, Elif Oz...
81
Voted
CHI
2010
ACM
15 years 10 months ago
Indexicality of language and the art of creating treasures
The indexicality of language refers to the linkage between the language and the situation of use for determining the meaning of what is being said. In this paper I describe how a ...
Matti Rantanen
EUROSEC
2010
ACM
15 years 10 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
154
Voted
CSFW
2003
IEEE
15 years 10 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
EUROMICRO
2003
IEEE
15 years 10 months ago
Drivers and inhibitors to the development of a software component industry
The idea of component based software systems has a long tradition in the field of software engineering. Component markets have been an integral part of this idea. However, such ma...
Heiko Hahn, Klaus Turowski