Sciweavers

596 search results - page 38 / 120
» Theories of Access Consciousness
Sort
View
WPES
2003
ACM
15 years 4 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
NORDICHI
2006
ACM
15 years 4 months ago
SoundBar: exploiting multiple views in multimodal graph browsing
In this paper we discuss why access to mathematical graphs is problematic for visually impaired people. By a review of graph understanding theory and interviews with visually impa...
David K. McGookin, Stephen A. Brewster
CCS
2005
ACM
15 years 4 months ago
Secure collaboration in mediator-free environments
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several ...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 5 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ISMIS
2005
Springer
15 years 4 months ago
Modelling Good Entry Pages on the Web
Being a good entry page to a Web site reflects how well the page enables a user to obtain optimal access, by browsing, to relevant and quality pages within the site. Our aim is to...
Theodora Tsikrika, Mounia Lalmas