Sciweavers

1818 search results - page 78 / 364
» How users use access control
Sort
View
96
Voted
ESORICS
2007
Springer
15 years 8 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
141
Voted
MOBICOM
2010
ACM
15 years 2 months ago
Profiling users in a 3g network using hourglass co-clustering
With widespread popularity of smart phones, more and more users are accessing the Internet on the go. Understanding mobile user browsing behavior is of great significance for seve...
Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin...
99
Voted
SACMAT
2006
ACM
15 years 8 months ago
Towards reasonability properties for access-control policy languages
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Michael Carl Tschantz, Shriram Krishnamurthi
112
Voted
HCI
2009
15 years 12 days ago
Enabling Interactive Access to Web Tables
Tables are widely used in web pages. Unfortunately, most web tables can only be passively accessed but cannot be interactively accessed, that is, users can view information display...
Xin Yang, Wenchang Xu, Yuanchun Shi
116
Voted
ASSETS
2008
ACM
15 years 4 months ago
Sudoku access: a sudoku game for people with motor disabilities
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer g...
Stéphane Norte, Fernando G. Lobo