Sciweavers

196 search results - page 14 / 40
» A Hacking View of Access Control
Sort
View
ACSC
2002
IEEE
14 years 2 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
IWPC
2005
IEEE
14 years 3 months ago
Working Session: Textual Views of Source Code to Support Comprehension
Source code can be viewed in many ways, with each view facilitating access to different information contained within the code. In this working session, we will explore the role th...
Anthony Cox, Michael L. Collard
HCI
2009
13 years 7 months ago
Enabling Interactive Access to Web Tables
Tables are widely used in web pages. Unfortunately, most web tables can only be passively accessed but cannot be interactively accessed, that is, users can view information display...
Xin Yang, Wenchang Xu, Yuanchun Shi
ICMB
2005
IEEE
114views Business» more  ICMB 2005»
14 years 3 months ago
WLAN Communities and Internet Access Sharing: A Regulatory Overview
The widespread adoption of wireless LAN has paved the way for the emergence of a compelling alternative to cellular networks for obtaining Internet access on the move. This has ge...
Giovanni Camponovo, Davide Cerutti
CCS
2005
ACM
14 years 3 months ago
Secure collaboration in mediator-free environments
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several ...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor