Sciweavers

1818 search results - page 35 / 364
» How users use access control
Sort
View
NORDICHI
2006
ACM
14 years 3 months ago
Using historical data to guide user interface evolution
In this paper we show how historical data, such as existing domain-specific databases or access logs, can be used to guide user interface design. We show how we employed such data...
Stanislaw Osinski
HCI
2007
13 years 10 months ago
Universal Design and Mobile Devices
The use of mobile technologies for self services, and the inclusion of elderly and cognitively disabled users in the self-service society can be improved by the application of appr...
Rita Hellman
ADC
2008
Springer
114views Database» more  ADC 2008»
13 years 11 months ago
An Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Maggie Duong, Yanchun Zhang
ITCC
2005
IEEE
14 years 2 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
IEEEMSP
2002
IEEE
166views Multimedia» more  IEEEMSP 2002»
14 years 1 months ago
Medium access control with channel state information for large sensor networks
Abstract—Traditionally, random access protocols have been designed and studied by assuming simple models for the physical layer. We introduce a reception model that incorporates ...
Srihari Adireddy, Lang Tong