Sciweavers

3793 search results - page 27 / 759
» An Object Data Model with Roles
Sort
View
SACMAT
2010
ACM
13 years 5 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
DOCENG
2003
ACM
14 years 19 days ago
Model driven architecture based XML processing
A number of applications that process XML documents interpret them as objects of application specific classes in a given domain. Generic interfaces such as SAX and DOM leave this ...
Ivan Kurtev, Klaas van den Berg
HAPTICS
2009
IEEE
14 years 2 months ago
Role determination in human-human interaction
Physical human-robot interaction can be significantly improved when being aware about the role each partner takes in a joint manipulation task. This holds especially in computer ...
Nikolay Stefanov, Angelika Peer, Martin Buss
WWW
2008
ACM
14 years 8 months ago
Validating the use and role of visual elements of web pages in navigation with an eye-tracking study
This paper presents an eye-tracking study that examines how people use the visual elements of Web pages to complete certain tasks. Whilst these elements are available to play thei...
Yeliz Yesilada, Caroline Jay, Robert Stevens, Simo...
TKDE
2008
177views more  TKDE 2008»
13 years 7 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...