Sciweavers

3712 search results - page 525 / 743
» Role-Based Access Control
Sort
View
CCS
2001
ACM
15 years 9 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
139
Voted
CSCW
2000
ACM
15 years 9 months ago
WebSplitter: a unified XML framework for multi-device collaborative Web browsing
WebSplitter symbolizes the union of pervasive multi-device computing and collaborative multi-user computing. WebSplitter provides a unified XML framework that enables multi-device...
Richard Han, Veronique Perret, Mahmoud Naghshineh
159
Voted
MOBICOM
1998
ACM
15 years 8 months ago
On Programmable Universal Mobile Channels in a Cellular Internet
In this paper we introduce universal mobile channels, a le communications abstraction that enables users and service providers to program application-speci c adaptive mobile servi...
Raymond R.-F. Liao, Andrew T. Campbell
VISUALIZATION
1992
IEEE
15 years 8 months ago
Display of Scientific Data Structures for Algorithm Visualization
algorithms as networks of modules. The data flow architecture is popular because of the flexibility of mixing calculation modules with display modules, and because of its easy grap...
William L. Hibbard, Charles R. Dyer, Brian E. Paul
141
Voted
CCS
2006
ACM
15 years 8 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang