Sciweavers

1818 search results - page 3 / 364
» How users use access control
Sort
View
INTR
2007
100views more  INTR 2007»
13 years 5 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
13 years 10 months ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
ICDCIT
2004
Springer
13 years 10 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller
VLDB
1994
ACM
130views Database» more  VLDB 1994»
13 years 9 months ago
Experiments on Access to Digital Libraries: How can Images and Text be Used Together
Should digital libraries be based on image or text display? Which will serve users better? Experience and experiments show that users can employ either, and that there are technic...
Michael Lesk
IFIP
2003
Springer
13 years 10 months ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott