Sciweavers

708 search results - page 9 / 142
» Implementing access control to people location information
Sort
View
ICDCSW
2005
IEEE
14 years 1 months ago
An Extended Directional MAC for Location Information Staleness in Ad Hoc Networks
Recently, several directional MAC protocols using smart antennas or directional antennas have been proposed for wireless ad hoc networks including our proposed MAC protocol called...
Masanori Takata, Masaki Bandai, Takashi Watanabe
CBMS
2006
IEEE
14 years 1 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
13 years 7 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
BCSHCI
2008
13 years 9 months ago
Innovations in measuring accessibility: theoretical and practical perspectives
Recently, there has been an increased awareness in the general public, in government and in business that people with disabilities and older people have distinct needs and prefere...
Helen Petrie, Christopher Power, Ray Adams, Fausti...
CHI
2007
ACM
14 years 8 months ago
Software or wetware?: discovering when and why people use digital prosthetic memory
Our lives are full of memorable and important moments, as well as important items of information. The last few years have seen the proliferation of digital devices intended to sup...
Steve Whittaker, Vaiva Kalnikaité