Sciweavers

35 search results - page 4 / 7
» Beyond File Permissions: Controlling User Actions
Sort
View
ISW
2004
Springer
14 years 1 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
ACSAC
2002
IEEE
14 years 22 days ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
NPIV
1998
ACM
117views Visualization» more  NPIV 1998»
13 years 12 months ago
Data Object and Label Placement For Information Abundant Visualizations
Placing numerous data objects and their corresponding labels in limited screen space is a challenging problem in information visualization systems. Extending map-oriented techniqu...
Jia Li, Catherine Plaisant, Ben Shneiderman
LISA
1994
13 years 9 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
EXPCS
2007
13 years 11 months ago
The user in experimental computer systems research
Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance eva...
Peter A. Dinda, Gokhan Memik, Robert P. Dick, Bin ...