Sciweavers

299 search results - page 58 / 60
» Optimizing a policy authoring framework for security and pri...
Sort
View
W4A
2006
ACM
13 years 11 months ago
Contextual web accessibility - maximizing the benefit of accessibility guidelines
We argue that while work to optimize the accessibility of the World Wide Web through the publication and dissemination of a range of guidelines is of great importance, there is al...
David Sloan, Andy Heath, Fraser Hamilton, Brian Ke...
CCS
2009
ACM
14 years 17 days ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
SACMAT
2006
ACM
13 years 11 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
13 years 10 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
CHI
2007
ACM
14 years 6 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...