Sciweavers

1818 search results - page 157 / 364
» How users use access control
Sort
View
117
Voted
ACSAC
1999
IEEE
15 years 7 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
85
Voted
CHI
2001
ACM
16 years 3 months ago
Partitioning digital worlds: focal and peripheral awareness in multiple monitor use
Software today does not help us partition our digital worlds effectively. We must organize them ourselves. This field study of users of multiple monitors examines how people with ...
Jonathan Grudin
121
Voted
VRST
2006
ACM
15 years 8 months ago
Intuitively specifying object dynamics in virtual environments using VR-WISE
Designing and building Virtual Environments is not an easy task, especially when it comes to specifying object behavior where either knowledge about animation techniques or progra...
Bram Pellens, Frederic Kleinermann, Olga De Troyer
152
Voted
PERCOM
2006
ACM
16 years 2 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
141
Voted
PERCOM
2005
ACM
16 years 2 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...