Sciweavers

842 search results - page 29 / 169
» About the authors
Sort
View
MMMACNS
2005
Springer
14 years 1 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
CHI
2009
ACM
14 years 8 months ago
Sacred imagery in techno-spiritual design
Despite increased knowledge about how Information and Communications Technologies (ICTs) are used to support religious and spiritual practices, designers know little about how to ...
Susan Wyche, Kelly E. Caine, Benjamin K. Davison, ...
CHI
2005
ACM
14 years 8 months ago
Managers' email: beyond tasks and to-dos
In this paper, we describe preliminary findings that indicate that managers and non-mangers think about their email differently. We asked three research managers and three researc...
Catalina Danis, Wendy A. Kellogg, Tessa A. Lau, Ma...
CHI
2004
ACM
14 years 8 months ago
Privacy policies as decision-making tools: an evaluation of online privacy notices
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy ...
Carlos Jensen, Colin Potts
CHI
2004
ACM
14 years 1 months ago
Collections: flexible, essential tools for information management
While collections—aggregation mechanisms such as folders, buddy lists, photo albums, etc.—clearly play a central role in information management, the potential benefits of true...
David R. Karger, Dennis Quan