Sciweavers

196 search results - page 9 / 40
» A Hacking View of Access Control
Sort
View
SIGCSE
2005
ACM
192views Education» more  SIGCSE 2005»
14 years 3 months ago
Ubiquitous presenter: increasing student access and control in a digital lecturing environment
The University of Washington’s Classroom Presenter lecturing system enables an active lecturing environment by combining a standard electronic slide presentation format with the...
Michelle Wilkerson, William G. Griswold, Beth Simo...
ICICS
2010
Springer
13 years 7 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
INFOCOM
2003
IEEE
14 years 2 months ago
Congestion Control Policies for IP-based CDMA Radio Access Networks
— As CDMA-based cellular networks mature, the current point-to-point links used in connecting base stations to network controllers will evolve to an IP-based Radio Access Network...
Sneha Kumar Kasera, Ramachandran Ramjee, Sandra R....
IEEEARES
2010
IEEE
14 years 4 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
ERCIMDL
2006
Springer
170views Education» more  ERCIMDL 2006»
14 years 1 months ago
Semantic Web Techniques for Multiple Views on Heterogeneous Collections: A Case Study
Abstract. Integrated digital access to multiple collections is a prominent issue for many Cultural Heritage institutions. Metadata describing diverse collections must be interopera...
Marjolein van Gendt, Antoine Isaac, Lourens van de...