Sciweavers

561 search results - page 33 / 113
» Remote Access Security Issues
Sort
View
ICMCS
2008
IEEE
144views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Enabling access to sound archives through integration, enrichment and retrieval
Many digital sound archives still suffer from tremendous problems concerning access. Materials are often in different formats, with related media in separate collections, and with...
Ivan Damnjanovic, Josh Reiss, Dan Barry
IEEEARES
2008
IEEE
15 years 4 months ago
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications
As more and more information becomes accessible via on-line databases, more public services can be provided and more complex queries involving several registers become feasible as...
Jan Willemson, Arne Ansper
IJNSEC
2006
112views more  IJNSEC 2006»
14 years 9 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
IEEEARES
2008
IEEE
15 years 4 months ago
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems
Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentraliz...
Maria Luisa Damiani, Claudio Silvestri, Elisa Bert...
EUPROJECTS
2005
Springer
15 years 3 months ago
Participatory Insight to Universal Access: Methods and Validation Exercises
Participatory methods can, in principle, be applied for a variety of purposes to gain insight into the context of use of an artefact or the way in which tasks are performed by end ...
Michael Pieper, Karl Stroetmann