Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of c...
Michael Toomim, Xianhang Zhang, James Fogarty, Jam...
This paper discusses the challenges of putting Apple Macintosh OSX into open access and computer lab environments. Categories and Subject Descriptors K.6.4 [Management of Computin...
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach ...
Abstract. This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the...
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...