Sciweavers

5273 search results - page 220 / 1055
» Secured Web Access
Sort
View
DBSEC
2006
122views Database» more  DBSEC 2006»
15 years 6 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
165
Voted
IFIP
2010
Springer
14 years 11 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
WWW
2010
ACM
15 years 3 months ago
Hearsay: a new generation context-driven multi-modal assistive web browser
This demo will present HearSay, a multi-modal non-visual web browser, which aims to bridge the growing Web Accessibility divide between individuals with visual impairments and the...
Yevgen Borodin, Faisal Ahmed, Muhammad Asiful Isla...
IJWIS
2007
77views more  IJWIS 2007»
15 years 4 months ago
World's first web census
: Purpose — To measure the exact size of the World Wide Web (i.e., a census). The measure used is the number of publicly accessible web servers on port 80. Design/methodology/app...
Darcy G. Benoit, André Trudel
ER
2001
Springer
148views Database» more  ER 2001»
15 years 9 months ago
On the Automatic Extraction of Data from the Hidden Web
An increasing amount of Web data is accessible only by filling out HTML forms to query an underlying data source. While this is most welcome from a user perspective (queries are e...
Stephen W. Liddle, Sai Ho Yau, David W. Embley