Sciweavers

708 search results - page 50 / 142
» Implementing access control to people location information
Sort
View
SACMAT
2003
ACM
14 years 3 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
APWEB
2005
Springer
14 years 3 months ago
PODWIS: A Personalized Tool for Ontology Development in Domain Specific Web Information System
Complex structure and varying requirements increase the difficulties in developing domain specific Web Information Systems. People appeal to a smart tool to customize Web Informati...
Lv-an Tang, Hongyan Li, Zhiyong Pan, Shaohua Tan, ...
OZCHI
2006
ACM
14 years 4 months ago
Saxaren: strengthening informal collaboration among geographically distributed teachers
For people working in situations with few colleagues around, information technology could be used for increased communication with colleagues at other places. One such group is te...
Kristina Groth, Sinna Lindquist, Cristian Bogdan, ...
ISMAR
2008
IEEE
14 years 4 months ago
Augmented assembly using a mobile phone
We present a mobile phone based augmented reality (AR) assembly system that enable users to view complex models on their mobile phones. It is based on a client-server architecture...
Mika Hakkarainen, Charles Woodward, Mark Billinghu...
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 4 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen