Sciweavers

192 search results - page 13 / 39
» Actor-Centric Modeling of User Rights
Sort
View
3DPH
2009
190views Healthcare» more  3DPH 2009»
13 years 8 months ago
Vessels-Cut: A Graph Based Approach to Patient-Specific Carotid Arteries Modeling
We present a nearly automatic graph-based segmentation method for patient specific modeling of the aortic arch and carotid arteries from CTA scans for interventional radiology simu...
Moti Freiman, Noah Broide, Miriam Natanzon, Einav ...
ECRA
2002
165views more  ECRA 2002»
13 years 7 months ago
Effect of trust on customer acceptance of Internet banking
Two beliefs, ease of use and usefulness, have been considered to be fundamental in determining the acceptance of various IS in the past decades. These beliefs may not, however, fu...
Bomil Suh, Ingoo Han
ESORICS
2006
Springer
13 years 11 months ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
14 years 2 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
IJNSEC
2010
133views more  IJNSEC 2010»
13 years 2 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji