Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
Complex structure and varying requirements increase the difficulties in developing domain specific Web Information Systems. People appeal to a smart tool to customize Web Informati...
For people working in situations with few colleagues around, information technology could be used for increased communication with colleagues at other places. One such group is te...
Kristina Groth, Sinna Lindquist, Cristian Bogdan, ...
We present a mobile phone based augmented reality (AR) assembly system that enable users to view complex models on their mobile phones. It is based on a client-server architecture...
Mika Hakkarainen, Charles Woodward, Mark Billinghu...
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...