Sciweavers

1147 search results - page 13 / 230
» Transformation of Access Rights
Sort
View
IAAI
2003
13 years 10 months ago
Broadcast News Understanding and Navigation
The Broadcast News Editor (BNE) and Broadcast News Navigator (BNN) are fully implemented systems that exploit integrated image, speech, and language processing to support intellig...
Mark T. Maybury
IEEESCC
2006
IEEE
14 years 2 months ago
Ubiquitous Provision of Context Aware Web Services
Context-aware Web service is an interactive model between the context of service requesters and the services in Web-enabled environments. We envision that providing context-aware ...
Irene Y. L. Chen, Stephen J. H. Yang, Jia Zhang
CN
2007
111views more  CN 2007»
13 years 8 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
CSFW
1995
IEEE
14 years 4 days ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
RBAC
1998
85views more  RBAC 1998»
13 years 10 months ago
Control Principles and Role Hierarchies
Role-based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes t...
Jonathan D. Moffett