Sciweavers

981 search results - page 151 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
CCS
2006
ACM
15 years 5 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
SOUPS
2009
ACM
15 years 8 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
AAAI
2008
15 years 3 months ago
On-line Planning and Scheduling: An Application to Controlling Modular Printers
This paper summarizes recent work reported at ICAPS on applying artificial intelligence techniques to the control of production printing equipment. Like many other real-world appl...
Minh Binh Do, Wheeler Ruml, Rong Zhou
DIM
2006
ACM
15 years 7 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 1 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang