Sciweavers

1818 search results - page 95 / 364
» How users use access control
Sort
View
IUI
2004
ACM
14 years 2 months ago
TUISTER: a tangible UI for hierarchical structures
Tangible user interfaces provide access to virtual information through intuitive physical manipulation. However, feedback is mostly provided by displays in the environment instead...
Andreas Butz, Markus H. Gross, Antonio Krüger
WWW
2011
ACM
13 years 4 months ago
Open and decentralized access across location-based services
Users now interact with multiple Location-Based Services (LBS) through a myriad set of location-aware devices and interfaces. However, current LBS tend to be centralized silos wit...
Yiming Liu, Rui Yang, Erik Wilde
SDMW
2004
Springer
14 years 2 months ago
Using Delay to Defend Against Database Extraction
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
SEKE
2007
Springer
14 years 3 months ago
A Development Platform for Distributed User Interfaces
Developing user interfaces for a heterogeneous environment is a difficult challenge. Partial distribution of the user interface is an event harder one. Specifically providing de...
Anders Larsson, Magnus Ingmarsson, Bo Sun
PROVSEC
2009
Springer
14 years 3 months ago
Self-enforcing Private Inference Control
Private inference control enables simultaneous enforcement of inference control and protection of users’ query privacy. Private inference control is a useful tool for database ap...
Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zho...