Sciweavers

449 search results - page 7 / 90
» User experiences with sharing and access control
Sort
View
CCS
2006
ACM
15 years 1 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
SPC
2005
Springer
15 years 2 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
ICRA
2010
IEEE
96views Robotics» more  ICRA 2010»
14 years 8 months ago
Increasing robotic wheelchair safety with collaborative control: Evidence from secondary task experiments
— Powered wheelchairs play a vital role in bringing independence to the severely mobility–impaired. Our robotic wheelchair aims to assist users in driving safely, without under...
Tom Carlson, Yiannis Demiris
CCS
2006
ACM
15 years 1 months ago
Privacy-preserving semantic interoperation and access control of heterogeneous databases
Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated database...
Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalak...
CCS
1994
ACM
15 years 1 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche