Sciweavers

119 search results - page 7 / 24
» Integrating usability and accessibility in information assur...
Sort
View
WWW
2008
ACM
14 years 9 months ago
Personalized view-based search and visualization as a means for deep/semantic web data access
Effective access to and navigation in information stored in deep Web ontological repositories or relational databases has yet to be realized due to issues with usability of user i...
Mária Bieliková, Michal Tvarozek
ESCIENCE
2006
IEEE
14 years 2 months ago
FAME: Adding Multi-Level Authentication to Shibboleth
The paper describes the design of FAME (Flexible Access Middleware Extension) architecture aimed at providing multi-level user authentication service for Shibboleth, which is endo...
Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A...
ACSAC
2005
IEEE
14 years 2 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
EUC
2007
Springer
14 years 2 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ASSETS
2008
ACM
13 years 10 months ago
PowerUp: an accessible virtual world
PowerUp is a multi-player virtual world educational game with a broad set of accessibility features built in. This paper considers what features are necessary to make virtual worl...
Shari Trewin, Vicki L. Hanson, Mark Laff, Anna Cav...