Sciweavers

434 search results - page 60 / 87
» Security Documentation
Sort
View
SIGUCCS
2003
ACM
14 years 26 days ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
CCS
2001
ACM
14 years 3 days ago
Taking the Copy Out of Copyright
Under current U.S. law and common understanding, the fundamental right granted by copyright is the right of reproduction – of making copies. Indeed, the very word “copyright”...
Ernest Miller, Joan Feigenbaum
SIGUCCS
2003
ACM
14 years 26 days ago
Supporting a Windows XP/Red Hat Linux dual boot environment
Customers of public computing sites and faculty who use the public computer classrooms to teach want diversity in computing. Inevitably, there’s a group that does not want to te...
Bert Valenzuela
ENTCS
2007
121views more  ENTCS 2007»
13 years 7 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
PPDP
2010
Springer
13 years 5 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch