Sciweavers

1627 search results - page 192 / 326
» On context in authorization policy
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 7 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
DEBU
2010
127views more  DEBU 2010»
13 years 7 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
CHI
2011
ACM
13 years 1 months ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
TOG
2012
193views Communications» more  TOG 2012»
12 years 17 days ago
Continuous character control with low-dimensional embeddings
Interactive, task-guided character controllers must be agile and responsive to user input, while retaining the flexibility to be readily authored and modified by the designer. C...
Sergey Levine, Jack M. Wang, Alexis Haraux, Zoran ...
CHI
2009
ACM
14 years 10 months ago
Towards human-centered support for indoor navigation
This paper presents a new perspective for the design of indoor navigation support. In contrast to technology oriented approaches coming from Context Awareness research, we argue f...
Leonardo Ramirez, Sebastian Denef, Tobias Dyrks