We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
This demo will present HearSay, a multi-modal non-visual web browser, which aims to bridge the growing Web Accessibility divide between individuals with visual impairments and the...
Yevgen Borodin, Faisal Ahmed, Muhammad Asiful Isla...
: Purpose — To measure the exact size of the World Wide Web (i.e., a census). The measure used is the number of publicly accessible web servers on port 80. Design/methodology/app...
An increasing amount of Web data is accessible only by filling out HTML forms to query an underlying data source. While this is most welcome from a user perspective (queries are e...