Sciweavers

360 search results - page 12 / 72
» Remote Access of Computer Controlled Experiments
Sort
View
CCS
2010
ACM
13 years 7 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
CHI
2005
ACM
14 years 8 months ago
Calling while driving: effects of providing remote traffic context
Cell phone conversations distract drivers. This research explores the possibility of reducing distracting by providing callers with remote information about the driver's traf...
Mike Schneider, Sara B. Kiesler
WCNC
2010
IEEE
13 years 5 months ago
Addressing Response Time and Video Quality in Remote Server Based Internet Mobile Gaming
A new remote server based gaming approach, where the responsibility of executing the gaming engines is put on remote servers instead of the mobile devices, has the potential for en...
Shaoxuan Wang, Sujit Dey
SACMAT
2010
ACM
14 years 11 days ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam