Sciweavers

1818 search results - page 31 / 364
» How users use access control
Sort
View
GCC
2003
Springer
14 years 2 months ago
Study on a Secure Access Model for the Grid Catalogue
To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalo...
Bing Xie, Xiaolin Gui, Qingjiang Wang
IUI
2004
ACM
14 years 2 months ago
SUPPLE: automatically generating user interfaces
In order to give people ubiquitous access to software applications, device controllers, and Internet services, it will be necessary to automatically adapt user interfaces to the c...
Krzysztof Gajos, Daniel S. Weld
ESORICS
2009
Springer
14 years 3 months ago
Access Control in Location-Based Services
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
ICCV
2005
IEEE
14 years 2 months ago
Perceptive User Interface, a Generic Approach
Abstract. This paper describes the development of a real-time perceptive user interface. Two cameras are used to detect a user’s head, eyes, hand, fingers and gestures. These cu...
Michael Van den Bergh, Ward Servaes, Geert Caenen,...
COMPSAC
2007
IEEE
14 years 29 days ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie