Sciweavers

4999 search results - page 864 / 1000
» User Interaction in the BANKS System
Sort
View
NDSS
2007
IEEE
15 years 4 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
JCDL
2005
ACM
152views Education» more  JCDL 2005»
15 years 3 months ago
In the company of readers: the digital library book as "practiced place"
Most digital libraries (DLs) necessarily focus on the complex issues that arise when library collections are freed from their physical anchors in buildings and on paper. Typical i...
Nancy Kaplan, Yoram Chisik
CCS
2004
ACM
15 years 3 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
IV
2006
IEEE
113views Visualization» more  IV 2006»
15 years 4 months ago
Output Media Adapted Cartographic Visualisation
In modern cartography of the late twentieth century, the Internet offers an ideal platform for the communication via maps. The map graphics pose as an essential part of the graphi...
Alexandra Stadler, Mirjanka Lechthaler
RTAS
2006
IEEE
15 years 4 months ago
Zygaria: Storage Performance as a Managed Resource
Large-scale storage systems often hold data for multiple applications and users. A problem in such systems is isolating applications and users from each other to prevent their wor...
Theodore M. Wong, Richard A. Golding, Caixue Lin, ...