Sciweavers

270 search results - page 30 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
CCS
2010
ACM
14 years 9 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
ICMI
2004
Springer
148views Biometrics» more  ICMI 2004»
15 years 2 months ago
Multimodal interface platform for geographical information systems (GeoMIP) in crisis management
A novel interface system for accessing geospatial data (GeoMIP) has been developed that realizes a user-centered multimodal speech/gesture interface for addressing some of the cri...
Pyush Agrawal, Ingmar Rauschert, Keerati Inochanon...
TCS
2008
14 years 9 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
OZCHI
2006
ACM
15 years 3 months ago
The Wiki: an environment to revolutionise employees' interaction with corporate knowledge
Some corporations have adopted a Wiki on their Intranets for employees to collectively store, edit and access workrelated material such as reports, best-practice features, and doc...
Helen Hasan, Charmaine C. Pfaff
DFN
2003
14 years 11 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen