Sciweavers

1818 search results - page 186 / 364
» How users use access control
Sort
View
CHI
2010
ACM
15 years 11 months ago
Factors impeding Wiki use in the enterprise: a case study
Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population...
Lester J. Holtzblatt, Laurie E. Damianos, Daniel W...
SASO
2007
IEEE
15 years 11 months ago
Improving ICE Service Selection in a P2P System using the Gradient Topology
Internet Connectivity Establishment (ICE) is becoming increasingly important for P2P systems on the open Internet, as it enables NAT-bound peers to provide accessible services. A ...
Jim Dowling, Jan Sacha, Seif Haridi
131
Voted
ECUMN
2007
Springer
15 years 11 months ago
Modeling and Analysis of Energy Consumption in IEEE802.11e Networks
Energy is a major concern in wireless networks, be it for the target mobile user, as is the case of IEEE802.11 Infrastructure mode, or for all the users as in IEEE802.11 ad hoc mo...
Olfa Bouattay, Tijani Chahed, Mounir Frikha, Sami ...
140
Voted
AAAI
2007
15 years 7 months ago
Enabling Intelligent Content Discovery on the Mobile Internet
The mobile Internet is a massive opportunity for mobile operators and content providers, but despite significant improvements in handsets, infrastructure, content, and charging m...
Barry Smyth, Paul Cotter, Stephen Oman
130
Voted
ICSE
2007
IEEE-ACM
16 years 5 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...