Sciweavers

1150 search results - page 77 / 230
» Specifying Information-Flow Controls
Sort
View
CHI
2011
ACM
13 years 2 months ago
Exploring reactive access control
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...
CODASPY
2012
12 years 6 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
CGI
2001
IEEE
14 years 2 months ago
Paint By Relaxation
We use relaxation to produce painted imagery from images and video. An energy function is first specified; we then search for a painting with minimal energy. The appeal of this st...
Aaron Hertzmann
WWW
2007
ACM
14 years 11 months ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
CHI
2009
ACM
14 years 11 months ago
The VoiceBot: a voice controlled robot arm
We present a system whereby the human voice may specify continuous control signals to manipulate a simulated 2D robotic arm and a real 3D robotic arm. Our goal is to move towards ...
Brandi House, Jonathan Malkin, Jeff Bilmes