Sciweavers

15 search results - page 2 / 3
» Fine-Granularity Access Control in 3-Tier Laboratory Informa...
Sort
View
QEST
2005
IEEE
13 years 10 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
13 years 11 months ago
False Information in Internet Auction Communities
As one of the most important features, the Internet enables individuals to make their personal thoughts and opinions easily accessible to the global community of Internet users. N...
Oliver Hinz
POLICY
2007
Springer
13 years 11 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
ASSETS
2008
ACM
13 years 7 months ago
A comparative test of web accessibility evaluation methods
Accessibility auditors have to choose a method when evaluating accessibility: expert review (a.k.a. conformance testing), user testing, subjective evaluations, barrier walkthrough...
Giorgio Brajnik
SACMAT
2006
ACM
13 years 11 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov