Sciweavers

1818 search results - page 135 / 364
» How users use access control
Sort
View
SPW
2005
Springer
14 years 2 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
WSC
2000
13 years 10 months ago
An interactive land use VRML application (ILUVA) with servlet assist
We summarize progress achieved on an interactive land use VRML application (ILUVA) with servlet assist. The purpose of this application is to enable one to take a virtual land are...
Lee A. Belfore II, Suresh Chitithoti
FGCS
2010
99views more  FGCS 2010»
13 years 7 months ago
A conceptual model for attribute aggregation
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein
SIGGRAPH
1992
ACM
14 years 1 months ago
Through-the-lens camera control
In this paper we introduce through-the-lens camera control, a body of techniques that permit a user to manipulate a virtual camera by controlling and constraining features in the ...
Michael Gleicher, Andrew P. Witkin
PAMI
2007
150views more  PAMI 2007»
13 years 8 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...