Sciweavers

1818 search results - page 183 / 364
» How users use access control
Sort
View
CHI
2004
ACM
16 years 5 months ago
EyeDraw: a system for drawing pictures with the eyes
This paper describes the development of EyeDraw, a software system that enables children with severe motor impairments to draw pictures by just moving their eyes. EyeDraw will hel...
Anthony J. Hornof, Anna Cavender, Rob Hoselton
ICWS
2009
IEEE
16 years 2 months ago
Service Provenance in QoS-Aware Web Service Runtimes
In general, provenance of electronic data represents an important issue in information systems. So far, Serviceoriented Computing research has mainly focused on provenance of data...
Anton Michlmayr, Florian Rosenberg, Philipp Leitne...
ACSAC
2003
IEEE
15 years 10 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
ICIP
2010
IEEE
15 years 2 months ago
GAME-theory-based cross-layer optimization for wireless DS-CDMA visual sensor networks
We propose a game-theory-based cross-layer optimization scheme for wireless Direct Sequence Code Division Multiple Access (DSCDMA) visual sensor networks. The scheme uses the Nash...
Lisimachos P. Kondi, Elizabeth S. Bentley
SDMW
2004
Springer
15 years 10 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...