Sciweavers

1818 search results - page 99 / 364
» How users use access control
Sort
View
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
13 years 11 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
USS
2008
13 years 11 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
USENIX
1994
13 years 10 months ago
Acme: A User Interface for Programmers
A hybrid of window system, shell, and editor, Acme gives text-oriented applications a clean, expressive, and consistent style of interaction. Traditional window systems support in...
Rob Pike
IPM
2002
86views more  IPM 2002»
13 years 8 months ago
Traditional IR for web users: a context for general audience digital libraries
The emergence of general audience digital libraries (GADLs) defines a context that represents a hybrid of both ``traditional'' IR, using primarily bibliographic resource...
Dietmar Wolfram, Hong (Iris) Xie
IPM
2007
158views more  IPM 2007»
13 years 9 months ago
Validation and interpretation of Web users' sessions clusters
Understanding users’ navigation on the Web is important towards improving the quality of information and the speed of accessing large-scale Web data sources. Clustering of users...
George Pallis, Lefteris Angelis, Athena Vakali