Sciweavers

235 search results - page 8 / 47
» hicss 2006
Sort
View
HICSS
2006
IEEE
126views Biometrics» more  HICSS 2006»
15 years 3 months ago
A Model for Temporal Interval Authorizations
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with subjects and...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
15 years 3 months ago
Reorganizing Government: Bhutan Visa Online
Centralized government document infrastructure and a policy commitment to transform the tourism sector to a more vivid and efficient business sector works as drivers for implement...
Kim Viborg Andersen, Helle Zinner Henriksen
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 3 months ago
Prospects for the Employment of Directive Decision Devices in Financial Applications
Expert systems, decision support systems, and knowledge management systems, are computer-based constructs intended to somehow assist human users in making decisions. Directive dec...
Jon Blue, Francis Andoh-Baidoo, John W. Sutherland
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
15 years 3 months ago
Alternative Pathway to Electricity Market Reform: A Risk-Management Approach
— An evolutionary “Third Way” approach for restructuring the electricity industry is proposed, striking a balance between the extremes of vertical integration and direct libe...
Hung-po Chao, Shmuel S. Oren, Robert Wilson
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
15 years 3 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch