Sciweavers

3000 search results - page 116 / 600
» Accessing an Information System by Chatting
Sort
View
SACMAT
2003
ACM
14 years 2 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 3 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
TSE
1998
96views more  TSE 1998»
13 years 8 months ago
The Use of Cooperation Scenarios in the Design and Evaluation of a CSCW System
—Design and evaluation of groupware systems raise questions which do not have to be addressed in the context of single user systems. The designer has to take into account not onl...
Oliver Stiemerling, Armin B. Cremers
SACMAT
2010
ACM
13 years 7 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
MOBISYS
2009
ACM
14 years 9 months ago
Predictive methods for improved vehicular WiFi access
With the proliferation of WiFi technology, many WiFi networks are accessible from vehicles on the road making vehicular WiFi access realistic. However, several challenges exist: l...
Pralhad Deshpande, Anand Kashyap, Chul Sung, Samir...