Sciweavers

58 search results - page 9 / 12
» Policy-hiding access control in open environment
Sort
View
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ICIAR
2009
Springer
14 years 2 months ago
Interacting with Digital Signage Using Hand Gestures
Abstract. Digital signage is a very attractive medium for advertisement and general communications in public open spaces. In order to add interaction capabilities to digital signag...
Qing Chen, François Malric, Yi Zhang, Muham...
NDSS
2006
IEEE
14 years 1 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
ICECCS
2008
IEEE
168views Hardware» more  ICECCS 2008»
14 years 2 months ago
Ubiquitous Service Regulation Based on Dynamic Rules
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
José Viterbo Filho, Markus Endler, Jean-Pie...
CHI
2010
ACM
14 years 2 months ago
Factors impeding Wiki use in the enterprise: a case study
Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population...
Lester J. Holtzblatt, Laurie E. Damianos, Daniel W...