Sciweavers

1657 search results - page 14 / 332
» Roles in Information Systems: A Survey
Sort
View
CCS
2006
ACM
15 years 5 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
102
Voted
BIOSIG
2007
90views Biometrics» more  BIOSIG 2007»
15 years 3 months ago
Cryptographic protection of biometric templates: Chance, challenges and applications
: In this contribution a survey is presented about the possibilities and difficulties of a cryptographic protection of biometric information for the purpose of authentication. The ...
Ulrike Korte, Rainer Plaga
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
15 years 8 months ago
The Role of Social Capital in the Creation of Community Wireless Networks
Community wireless networks (CWNs) offer free or affordable Internet access for the purpose of improving the well-being of the community. Many questions have been raised about the...
Abdelnasser Abdelaal, Hesham H. Ali, Deepak Khazan...
CIKM
2008
Springer
15 years 3 months ago
Towards a model of understanding social search
Search engine researchers typically depict search as the solitary activity of an individual searcher. In contrast, results from our critical-incident survey of 150 users on Amazon...
Brynn M. Evans, Ed H. Chi
92
Voted
CHI
2008
ACM
16 years 2 months ago
Searching for expertise
It is well established that there is a need to find experts to get answers or advice. A variety of expertise locator tools have emerged to help locate the right person. But there ...
Kate Ehrlich, N. Sadat Shami