Sciweavers

270 search results - page 30 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
CCS
2010
ACM
13 years 7 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
ICMI
2004
Springer
148views Biometrics» more  ICMI 2004»
14 years 29 days ago
Multimodal interface platform for geographical information systems (GeoMIP) in crisis management
A novel interface system for accessing geospatial data (GeoMIP) has been developed that realizes a user-centered multimodal speech/gesture interface for addressing some of the cri...
Pyush Agrawal, Ingmar Rauschert, Keerati Inochanon...
TCS
2008
13 years 7 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
OZCHI
2006
ACM
14 years 1 months ago
The Wiki: an environment to revolutionise employees' interaction with corporate knowledge
Some corporations have adopted a Wiki on their Intranets for employees to collectively store, edit and access workrelated material such as reports, best-practice features, and doc...
Helen Hasan, Charmaine C. Pfaff
DFN
2003
13 years 9 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen