Sciweavers

1818 search results - page 92 / 364
» How users use access control
Sort
View
BCSHCI
2007
13 years 10 months ago
A survey on common practice in designing audio in the user interface
The current practice of designing the auditory mode in the user interface is poorly understood. In this survey, we aim at revealing the common understanding of the role of audio i...
Christopher Frauenberger, Tony Stockman, Marie-Luc...
WISE
2002
Springer
14 years 2 months ago
Towards Translating Authorizations for Transformed XML Documents
Web based services and applications have increased the availability and accessibility of information. XML has recently emerged as an important standard in the area of information ...
Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko K...
SACMAT
2006
ACM
14 years 3 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
NIPS
2004
13 years 10 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 3 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright