Sciweavers

534 search results - page 46 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
CHI
2010
ACM
15 years 6 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
SUTC
2008
IEEE
15 years 6 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...
INFOCOM
2008
IEEE
15 years 6 months ago
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks
—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Josep...
ICTAC
2005
Springer
15 years 5 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...