Sciweavers

3712 search results - page 178 / 743
» Role-Based Access Control
Sort
View
CCS
2004
ACM
15 years 8 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
HCI
2001
15 years 3 months ago
Early experiences using visual tracking for computer access by people with profound physical disabilities
A dozen people who cannot speak and have very limited voluntary muscle control because of cerebral palsy or traumatic brain injury have tried using a new technology called the Cam...
James Gips, Margrit Betke, Philip A. DiMattia
ICWS
2008
IEEE
15 years 3 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
TMC
2008
179views more  TMC 2008»
15 years 2 months ago
Active Queue Management for Fair Resource Allocation in Wireless Networks
This paper investigates the interaction between end-to-end flow control and medium access control (MAC)-layer scheduling on wireless links. We consider a wireless network with mult...
Lachlan L. H. Andrew, Stephen V. Hanly, Rami G. Mu...
IEEEARES
2010
IEEE
15 years 9 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li