Sciweavers

1818 search results - page 99 / 364
» How users use access control
Sort
View
133
Voted
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
15 years 4 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
114
Voted
USS
2008
15 years 5 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
130
Voted
USENIX
1994
15 years 3 months ago
Acme: A User Interface for Programmers
A hybrid of window system, shell, and editor, Acme gives text-oriented applications a clean, expressive, and consistent style of interaction. Traditional window systems support in...
Rob Pike
113
Voted
IPM
2002
86views more  IPM 2002»
15 years 2 months ago
Traditional IR for web users: a context for general audience digital libraries
The emergence of general audience digital libraries (GADLs) defines a context that represents a hybrid of both ``traditional'' IR, using primarily bibliographic resource...
Dietmar Wolfram, Hong (Iris) Xie
142
Voted
IPM
2007
158views more  IPM 2007»
15 years 2 months ago
Validation and interpretation of Web users' sessions clusters
Understanding users’ navigation on the Web is important towards improving the quality of information and the speed of accessing large-scale Web data sources. Clustering of users...
George Pallis, Lefteris Angelis, Athena Vakali