Sciweavers

1818 search results - page 17 / 364
» How users use access control
Sort
View
CORR
2007
Springer
91views Education» more  CORR 2007»
13 years 9 months ago
BrlAPI: Simple, Portable, Concurrent, Application-level Control of Braille Terminals
Screen readers can drive braille devices for allowing visually impaired users to access computer environments, by providing them the same information as sighted users. But in some...
Samuel Thibault, Sébastien Hinderer
ICDCSW
2003
IEEE
14 years 2 months ago
Controlled Availability of Pervasive Web Services
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
Peter Robinson, Stefan Hild
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 10 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
BTW
2005
Springer
177views Database» more  BTW 2005»
14 years 2 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
ISPAN
2000
IEEE
14 years 1 months ago
User Level Communication on Alpha Linux Systems
Recent advances in commodity network interface technology enable scientists and engineers to build clusters of workstations or PCs to execute parallel applications. However, raw-h...
Jie Chen, William A. Watson III