Sciweavers

4445 search results - page 834 / 889
» Reflective Authorization Systems
Sort
View
WWW
2002
ACM
15 years 10 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell
CCS
2009
ACM
15 years 10 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
CCS
2009
ACM
15 years 10 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
CHI
2009
ACM
15 years 10 months ago
Questions in, knowledge in?: a study of naver's question answering community
Large general-purposed community question-answering sites are becoming popular as a new venue for generating knowledge and helping users in their information needs. In this paper ...
Kevin Kyung Nam, Mark S. Ackerman, Lada A. Adamic
CHI
2009
ACM
15 years 10 months ago
It's not that important: demoting personal information of low subjective importance using GrayArea
Users find it hard to delete unimportant personal information which often results in cluttered workspaces. We present a full design cycle for GrayArea, a novel interface that allo...
Ofer Bergman, Simon Tucker, Ruth Beyth-Marom, Edwa...