Sciweavers

445 search results - page 81 / 89
» Authorization and Access Control in IRO-DB
Sort
View
CHI
2011
ACM
14 years 1 months ago
Roboshop: multi-layered sketching interface for robot housework assignment and management
As various home robots come into homes, the need for efficient robot task management tools is arising. Current tools are designed for controlling individual robots independently, ...
Kexi Liu, Daisuke Sakamoto, Masahiko Inami, Takeo ...
IUI
2011
ACM
14 years 15 days ago
Groups without tears: mining social topologies from email
As people accumulate hundreds of “friends” in social media, a flat list of connections becomes unmanageable. Interfaces agnostic to social structure hinder the nuanced sharin...
Diana MacLean, Sudheendra Hangal, Seng Keat Teh, M...
74
Voted
CHI
2005
ACM
15 years 10 months ago
MusicCube: making digital music tangible
To some extent listening to digital music via storage devices has led to a loss of part of the physical experience associated with earlier media formats such as CDs and LPs. For e...
Miguel Bruns Alonso, David V. Keyson
CCS
2007
ACM
15 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
COMPSAC
2003
IEEE
15 years 2 months ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...