Sciweavers

427 search results - page 33 / 86
» Policies: Giving Users Control over Calls
Sort
View
CCS
1994
ACM
14 years 2 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
RTCSA
2007
IEEE
14 years 4 months ago
Activity-based Access Control Model to Hospital Information
Hospital work is characterized by the need to manage multiple activities simultaneously, constant local mobility, frequently interruptions, and intense collaboration and communica...
Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo ...
IFIP13
2004
13 years 11 months ago
Analysing Dynamic Function Scheduling Decisions
: Function allocation, as a process used in the construction of dependable complex systems, is a significant aspect of the design and implementation of interactive systems. It invo...
Karsten Loer, Michael Hildebrandt, Michael D. Harr...
NCA
2007
IEEE
14 years 4 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode
HRI
2009
ACM
14 years 2 months ago
On using mixed-initiative control: a perspective for managing large-scale robotic teams
Prior work suggests that the potential benefits of mixed initiative management of multiple robots are mitigated by situational factors, including workload and operator expertise....
Benjamin Hardin, Michael A. Goodrich