Sciweavers

1688 search results - page 96 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
SAC
2005
ACM
15 years 10 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
CHI
2008
ACM
16 years 5 months ago
Increasing the accessibility of pen-based technology: an investigation of age-related target acquisition difficulties
This paper describes the author's dissertation research on improving the accessibility of penbased technology. The first step for this research was to gather information on t...
Karyn Moffatt
173
Voted
AIM
2002
15 years 4 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
124
Voted
OZCHI
2005
ACM
15 years 10 months ago
Personalisation in intelligent environments: managing the information flow
This paper describes research into the personalised delivery of information about an intelligent environment. The challenges we need to address are the dual forms of the Invisibili...
Craig Chatfield, David J. Carmichael, René ...
141
Voted
PERVASIVE
2008
Springer
15 years 4 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...