Sciweavers

926 search results - page 140 / 186
» Policy framings for access control
Sort
View
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
CDC
2010
IEEE
103views Control Systems» more  CDC 2010»
14 years 5 months ago
Energy conservation and interference mitigation: From decoupling property to win-win strategy
This paper studies the problem of energy conservation of mobile terminals in a multi-cell TDMA network supporting real-time sessions. The corresponding optimization problem involv...
Liqun Fu, Hongseok Kim, Jianwei Huang, Soung Chang...
SEC
2007
14 years 11 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
81
Voted
SIS
2007
14 years 11 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
CHI
2009
ACM
15 years 10 months ago
Timing is everything?: the effects of timing and placement of online privacy indicators
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make pr...
Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor...