Sciweavers

490 search results - page 60 / 98
» Enabling User Control with Personal Identity Management
Sort
View
CCS
2007
ACM
15 years 6 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
104
Voted
CCS
2007
ACM
15 years 6 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
99
Voted
SACMAT
2009
ACM
15 years 7 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
ISMIR
2004
Springer
130views Music» more  ISMIR 2004»
15 years 5 months ago
Speech-Recognition Interfaces for Music Information Retrieval: 'Speech Completion' and 'Speech Spotter'
This paper describes music information retrieval (MIR) systems featuring automatic speech recognition. Although various interfaces for MIR have been proposed, speech-recognition i...
Masataka Goto, Katunobu Itou, Koji Kitayama, Tetsu...
EENERGY
2010
15 years 3 months ago
Policy-driven distributed and collaborative demand response in multi-domain commercial buildings
Enabling a sophisticated Demand Response (DR) framework, whereby individual consumers adapt their electricity consumption in response to price variations, is a major objective of ...
Archan Misra, Henning Schulzrinne