Sciweavers

1627 search results - page 61 / 326
» On context in authorization policy
Sort
View
FIW
2003
120views Communications» more  FIW 2003»
13 years 9 months ago
A Policy Architecture for Enhancing and Controlling Features
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec, Kenneth J. Turner
INTERACT
2003
13 years 9 months ago
Interaction with Context-Aware Mobile Hand-Held Devices
: Interaction with context-aware mobile hand-held devices creates new demands for user interfaces and interaction methods. These devices, which detect the use context in order to a...
Jonna Häkkilä
CHI
2008
ACM
14 years 8 months ago
Don't look now, but we've created a bureaucracy: the nature and roles of policies and rules in wikipedia
Wikis are sites that support the development of emergent, collective infrastructures that are highly flexible and open, suggesting that the systems that use them will be egalitari...
Brian S. Butler, Elisabeth Joyce, Jacqueline Pike
ICDCS
1998
IEEE
13 years 12 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
CHI
2011
ACM
12 years 11 months ago
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...