Sciweavers

1818 search results - page 168 / 364
» How users use access control
Sort
View
USENIX
2004
13 years 11 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
ERCIMDL
2006
Springer
170views Education» more  ERCIMDL 2006»
14 years 1 months ago
Semantic Web Techniques for Multiple Views on Heterogeneous Collections: A Case Study
Abstract. Integrated digital access to multiple collections is a prominent issue for many Cultural Heritage institutions. Metadata describing diverse collections must be interopera...
Marjolein van Gendt, Antoine Isaac, Lourens van de...
PUC
2000
97views more  PUC 2000»
13 years 9 months ago
Look, Ma, My Homepage is Mobile!
Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information, to the level of services and applications. Typic...
Roger Kehr, Andreas Zeidler
WWW
2009
ACM
14 years 10 months ago
QuWi: quality control in Wikipedia
We propose and evaluate QuWi (Quality in Wikipedia), a framework for quality control in Wikipedia. We build upon a previous proposal by Mizzaro [11], who proposed a method for sub...
Alberto Cusinato, Vincenzo Della Mea, Francesco Di...
ACSW
2003
13 years 11 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean