Sciweavers

687 search results - page 29 / 138
» Accessibility Transformation Gateway
Sort
View
ECOOP
1999
Springer
15 years 2 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
FOSSACS
2005
Springer
15 years 3 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
MM
2003
ACM
131views Multimedia» more  MM 2003»
15 years 3 months ago
Enhancing web accessibility
This demonstration will illustrate the key technical and user interface aspects of the Web Adaptation Technology. Various transformations underlying the system will be shown that ...
Alison Lee, Vicki L. Hanson
JHSN
2006
100views more  JHSN 2006»
14 years 10 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
ISSS
1999
IEEE
109views Hardware» more  ISSS 1999»
15 years 2 months ago
Loop Alignment for Memory Accesses Optimization
Portable or embedded systems allow more and more complex applications like multimedia today. These applications and submicronic technologies have made the power consumption criter...
Antoine Fraboulet, Guillaume Huard, Anne Mignotte