Sciweavers

596 search results - page 40 / 120
» Theories of Access Consciousness
Sort
View
ICFP
2012
ACM
13 years 1 months ago
Introspective pushdown analysis of higher-order programs
In the static analysis of functional programs, pushdown flow analabstract garbage collection skirt just inside the boundaries of soundness and decidability. Alone, each method re...
Christopher Earl, Ilya Sergey, Matthew Might, Davi...
ICFP
2008
ACM
15 years 11 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
EDBTW
2004
Springer
15 years 4 months ago
XML-Based Revocation and Delegation in a Distributed Environment
Abstract. The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase o...
Konstantina Stoupa, Athena Vakali, Fang Li, Ioanni...
ACMACE
2007
ACM
15 years 24 days ago
Transmedial interactions and digital games
As virtual worlds and games grow in both personal and cultural importance, present limitations in access to them is increasingly limiting their ability to achieve their potential....
Shaowen Bardzell, Vicky Wu, Jeffrey Bardzell, Nick...
SACMAT
2005
ACM
15 years 4 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...