Sciweavers

1818 search results - page 229 / 364
» How users use access control
Sort
View
SOCIALCOM
2010
15 years 2 months ago
Traffic in Social Media I: Paths Through Information Networks
Wikipedia is used every day by people all around the world, to satisfy a variety of information needs. We crosscorrelate multiple Wikipedia traffic data sets to infer various behav...
Jacob Ratkiewicz, Alessandro Flammini, Filippo Men...
ESORICS
2007
Springer
15 years 8 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li
CGF
2002
145views more  CGF 2002»
15 years 4 months ago
Local Physical Models for Interactive Character Animation
Our goal is to design and build a tool for the creation of expressive character animation. Virtual puppetry, also known as performance animation, is a technique in which the user ...
Sageev Oore, Demetri Terzopoulos, Geoffrey E. Hint...
ICIP
2004
IEEE
16 years 6 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu
ECTEL
2007
Springer
15 years 10 months ago
Exploiting Policies in an Open Infrastructure for Lifelong Learning
Nowadays, people are in need for continuous learning in order to keep up to date or be upgraded in their job. An infrastructure for lifelong learning requires continuous adaptation...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...