Sciweavers

1818 search results - page 278 / 364
» How users use access control
Sort
View
ICFP
2010
ACM
15 years 5 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
ACSAC
2010
IEEE
15 years 2 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
187
Voted
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
15 years 9 months ago
Dynamic Network Interface Selection in Multihomed Mobile Hosts
Abstract—Current mobile devices are often equipped with several network interfaces, which may be of different access technologies, both wireless and cellular. Different requireme...
Jukka Ylitalo, Tony Jokikyyny, Tero Kauppinen, Ant...
AH
2008
Springer
15 years 10 months ago
Collection Browsing through Automatic Hierarchical Tagging
In order to navigate huge document collections efficiently, tagged hierarchical structures can be used. For users, it is important to correctly interpret tag combinations. In this ...
Korinna Bade, Marcel Hermkes
COMSWARE
2006
IEEE
15 years 10 months ago
Resource management in heterogenous wireless networks with overlapping coverage
— Development in new radio technologies and increase in user demands are driving the deployment of a wide array of wireless networks, ranging from 802.11 networks in the local ar...
Bin Bin Chen, Mun Choon Chan