Sciweavers

1818 search results - page 55 / 364
» How users use access control
Sort
View
ITICSE
2004
ACM
14 years 2 months ago
Teaching operating systems administration with user mode linux
User Mode Linux is a virtual machine running on a GNULinux operating system. It is the right choice for teaching operating systems’ administration, as it does not need any dedic...
Renzo Davoli
DEXAW
2003
IEEE
137views Database» more  DEXAW 2003»
14 years 2 months ago
Applying the Semantic Web Layers to Access Control
The Semantic Web, also known as the Web of meaning, is considered the new generation of the Web. Its objective is to enable computers and people to work in cooperation. A requisit...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
W4A
2006
ACM
14 years 3 months ago
Contextual web accessibility - maximizing the benefit of accessibility guidelines
We argue that while work to optimize the accessibility of the World Wide Web through the publication and dissemination of a range of guidelines is of great importance, there is al...
David Sloan, Andy Heath, Fraser Hamilton, Brian Ke...
CCGRID
2006
IEEE
14 years 3 months ago
Uniform Job Monitoring using the HPC-Europa Single Point of Access
—Job monitoring in Grid systems presents an important challenge due to Grid environments are volatile, heterogeneous, not reliable and are managed by different middlewares and mo...
Francesc Guim, Ivan Rodero, Julita Corbalán...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 9 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...