Sciweavers

814 search results - page 45 / 163
» Integrated Accessibility Models of User Interfaces for IT an...
Sort
View
SACMAT
2004
ACM
14 years 2 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
CCS
2005
ACM
14 years 2 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
VRML
1999
ACM
14 years 1 months ago
A VRML Integration Methodology for Manufacturing Applications
This paper describes several methods for using the Virtual Reality Modeling Language (VRML) as the visualization integration technology for manufacturing simulation systems. One o...
Sandy Ressler, Afzal Godil, Qiming Wang, Gregory S...
ITCC
2002
IEEE
14 years 1 months ago
Mask and Multiple Format: Two Notions for a Progressive and Adapted Access to Information
This paper introduces the notions of mask and multiple format for setting up a progressive access to information in an Information System. Masks consist of more or less complete r...
Marlène Villanova-Oliver, Jérô...
CCS
2003
ACM
14 years 2 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...