Sciweavers

2655 search results - page 115 / 531
» Event Systems and Access Control
Sort
View
EUROSYS
2007
ACM
16 years 2 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 11 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
ICARCV
2008
IEEE
138views Robotics» more  ICARCV 2008»
15 years 11 months ago
Looking at the surprise: Bottom-up attentional control of an active camera system
—Inspired by the expectation-based perception of humans, a surprise-driven active vision system is proposed. This vision system not only considers spatial saliency of objects in ...
Tingting Xu, Quirin Mühlbauer, Stefan Sosnows...
EDM
2010
163views Data Mining» more  EDM 2010»
15 years 6 months ago
Can Order of Access to Learning Resources Predict Success?
Learning management systems capture student's interactions with the course contents in the form of event logs, including the order in which resources are accessed. We build on...
Hema Soundranayagam, Kalina Yacef
130
Voted
CCS
2004
ACM
15 years 10 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell