Sciweavers

1818 search results - page 14 / 364
» How users use access control
Sort
View
UM
2001
Springer
14 years 5 days ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
GCC
2004
Springer
14 years 1 months ago
A New Grid Security Framework with Dynamic Access Control
Abstract. In this paper, a new Grid security framework based on dynamic access control is introduced to address some security problem in Grid. Based on the dynamic evaluating resul...
Bing Xie, Xiaolin Gui, Yinan Li, Depei Qian
CCS
2007
ACM
13 years 11 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
SACMAT
2009
ACM
14 years 2 months ago
Usability meets access control: challenges and research opportunities
This panel discusses specific challenges in the usability of access control technologies and new opportunities for research. The questions vary from “Why nobody, even experts, ...
Konstantin Beznosov, Philip Inglesant, Jorge Lobo,...
TWC
2008
99views more  TWC 2008»
13 years 7 months ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan