Sciweavers

5273 search results - page 83 / 1055
» Secured Web Access
Sort
View
ADMA
2006
Springer
220views Data Mining» more  ADMA 2006»
15 years 3 months ago
Mining and Validation of Localized Frequent Web Access Patterns with Dynamic Tolerance
Mining user profiles is a crucial task for Web usage mining, and can be accomplished by mining frequent patterns. However, in the Web usage domain, sessions tend to be very sparse,...
Olfa Nasraoui, Suchandra Goswami
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
15 years 4 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
WWW
2009
ACM
15 years 10 months ago
Web 2.0: blind to an accessible new world
With the advent of Web 2.0 technologies, websites have evolved from static pages to dynamic, interactive Web-based applications with the ability to replicate common desktop functi...
Joshua M. Hailpern, Loretta Guarino Reid, Richard ...
JUCS
2008
130views more  JUCS 2008»
14 years 9 months ago
"Fine Tuning" Image Accessibility for Museum Web Sites
: Accessibility and usability guidelines are available to design web sites accessible to blind users. However, the actual usability of accessible web pages varies depending on the ...
Barbara Leporini, Ivan Norscia
COMPSEC
2002
92views more  COMPSEC 2002»
14 years 9 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong