Sciweavers

270 search results - page 41 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
CHI
2010
ACM
13 years 11 months ago
Informal interactions in nonprofit networks
Nonprofit organizations often need to excel in coordinating with other organizations and must do so in a variety of contexts and levels from the informal to the formal. Their abil...
Jennifer Stoll, W. Keith Edwards, Elizabeth D. Myn...
CHI
2007
ACM
14 years 8 months ago
Recent shortcuts: using recent interactions to support shared activities
We present an empirical study of teams that revealed the amount of extraneous individual work needed to enable collaboration: finding references to other people, finding files to ...
John C. Tang, James Lin, Jeffrey Pierce, Steve Whi...
SIGDOC
1997
ACM
13 years 11 months ago
Usability Studies of WWW Sites: Heuristic Evaluation vs. Laboratory Testing
This paper describes the strengths and weaknesses of two usability assessment methods frequently applied to web sites. It uses case histories of WWW usability studies conducted by...
Laurie Kantner, Stephanie Rosenbaum
SACMAT
2006
ACM
14 years 1 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
MSS
2007
IEEE
76views Hardware» more  MSS 2007»
14 years 1 months ago
Implementing and Evaluating Security Controls for an Object-Based Storage System
This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the TIO OSD standard. In contrast to previous work, ou...
Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Fran...