Sciweavers

1818 search results - page 210 / 364
» How users use access control
Sort
View
129
Voted
AVI
2004
15 years 6 months ago
Painting pictures to augment advice
I present an approach to designing decision support systems. The approach is to dissect a decision from both a normative and a cognitive perspective, and then to design a diagram ...
Kevin Burns
SIGMOD
2004
ACM
123views Database» more  SIGMOD 2004»
15 years 10 months ago
Model-Driven Business UI based on Maps
Future business applications will often have more than 2,000 forms and need to target several user interface (UI) technologies including: Web Browsers, Windows® Applications, PDA...
Per Bendsen
CHI
1996
ACM
15 years 9 months ago
BrightBoard: A Video-Augmented Environment
The goal of `Computer Augmented Environments' is to bring computational power to everyday objects with which users are already familiar, so that the user interface to this co...
Quentin Stafford-Fraser, Peter Robinson
CIKM
1994
Springer
15 years 9 months ago
Intelligent Caching: Selecting, Representing, and Reusing Data in an Information Server
Accessing information sources to retrieve data requested by a user can be expensive, especially when dealing with distributed information sources. One way to reduce this cost is t...
Yigal Arens, Craig A. Knoblock
137
Voted
IADIS
2004
15 years 6 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy