Sciweavers

468 search results - page 52 / 94
» Interactivity for Reactive Access Control
Sort
View
CHI
2005
ACM
15 years 10 months ago
The vacuum: facilitating the manipulation of distant objects
We present the design and evaluation of the vacuum, a new interaction technique that enables quick access to items on areas of a large display that are difficult for a user to rea...
Anastasia Bezerianos, Ravin Balakrishnan
CCS
2005
ACM
15 years 3 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
POLICY
2004
Springer
15 years 3 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
CCS
2004
ACM
15 years 3 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
PIMRC
2010
IEEE
14 years 7 months ago
Power control versus multiuser detection based cross-layer design in wireless ad hoc networks
Abstract--In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a c...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...