Sciweavers

1818 search results - page 22 / 364
» How users use access control
Sort
View
SOUPS
2010
ACM
14 years 26 days ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
TEDU
2008
213views Education» more  TEDU 2008»
13 years 7 months ago
TMAR: Extension of a Tabletop Interface Using Mobile Augmented Reality
Recently, many researchers have worked on tabletop systems. One issue with tabletop interfaces is how to control the table without using conventional desktop input devices such as ...
Sewon Na, Mark Billinghurst, Woontack Woo
GRID
2007
Springer
13 years 9 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
FLAIRS
2001
13 years 10 months ago
An Intelligent Interface for Keyboard and Mouse Control -- Providing Full Access to PC Functionality via Speech
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Bill Z. Manaris, Renée A. McCauley, Valanne...
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam