Sciweavers

1818 search results - page 56 / 364
» How users use access control
Sort
View
XMLSEC
2003
ACM
14 years 2 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
ENTCS
2006
140views more  ENTCS 2006»
13 years 9 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
ICASSP
2011
IEEE
13 years 24 days ago
Rate control for PSD limited multiple access systems through linear programming
In this paper we discuss rate control for multiuser multicarrier systems, where the transmitter has a single antenna and is subject to a PSD mask limitation while the receiver has...
Amir Leshem, Ephraim Zehavi
CHI
2007
ACM
14 years 9 months ago
Soap: how to make a mouse work in mid-air
Computer mice do not work in mid air. The reason is that a mouse is really only half an input device--the other half being the surface the mouse is operated on, such as a mouse pa...
Patrick Baudisch, Mike Sinclair, Andrew Wilson
SACMAT
2009
ACM
14 years 3 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...