Sciweavers

5273 search results - page 47 / 1055
» Secured Web Access
Sort
View
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 4 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
ACSAC
2009
IEEE
15 years 4 months ago
Java Security: A Ten Year Retrospective
— The first edition of Java (both the language and the platform) was released in 1995, which contained the all-ornothing security access model. A mid-1997 paper I published in IE...
Li Gong
BIOSURVEILLANCE
2007
Springer
15 years 4 months ago
Detecting Conserved RNA Secondary Structures in Viral Genomes: The RADAR Approach
Abstract. Conserved regions, or motifs, present among RNA secondary structures serve as a useful indicator for predicting the functionality of the RNA molecules. Automated detectio...
Mugdha Khaladkar, Jason T. L. Wang
W4A
2009
ACM
15 years 4 months ago
A framework for filtering web accessibility guidelines
This paper first presents a framework for filtering the Web Accessibility Guidelines according to contexts of use. It then presents a prototype that implements the framework and e...
Rehema Baguma, Roger G. Stone, Jude T. Lubega, Th....
MOBILITY
2009
ACM
15 years 2 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...