Sciweavers

807 search results - page 73 / 162
» Term Rewriting for Access Control
Sort
View
124
Voted
W4A
2004
ACM
15 years 9 months ago
The user experience: designs and adaptations
Specifications for accessibility of Web page do not necessarily guarantee a usable or satisfying Web experience for persons with disabilities. The needs of many of these individua...
Vicki L. Hanson
153
Voted
CCS
2008
ACM
15 years 5 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
139
Voted
CORR
2010
Springer
132views Education» more  CORR 2010»
15 years 1 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
118
Voted
CORR
2008
Springer
118views Education» more  CORR 2008»
15 years 3 months ago
An Activity-Based Model for Separation of Duty
This paper offers several contributions for separation of duty (SoD) administration in role-based access control (RBAC) systems. We first introduce a new formal framework, based o...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
146
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
A Distributed Multi-User MIMO MAC Protocol for Wireless Local Area Networks
— Multi-user multiple-input multiple-output (MIMO) systems have been emerging and attracting considerable attention recently for its potential to substantially improve system cap...
Lin X. Cai, Hangguan Shan, Weihua Zhuang, Xuemin S...