Sciweavers

863 search results - page 22 / 173
» Computational Methods for Intelligent Information Access
Sort
View
GRID
2007
Springer
14 years 11 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
CSREASAM
2006
15 years 1 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
CHI
2011
ACM
14 years 3 months ago
Developmentally situated design (DSD): making theoretical knowledge accessible to designers of children's technology
There is a wealth of theoretical knowledge about the developmental abilities and skills of children. However, this knowledge is not readily accessible to designers of interactive ...
Tilde Bekker, Alissa Nicole Antle
DRM
2003
Springer
15 years 5 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
MOBICOM
2006
ACM
15 years 5 months ago
A replica distrubution scheme for location-dependent information on vehicular ad hoc networks
In this paper we propose Road-aware Skip Copy (RSC) method for distributing replicas of location-dependent data on server-less vehicular ad hoc networks in urban areas. In the RSC...
M. Yamanaka, G. Tsuchida, S. Ishihara