Sciweavers

1147 search results - page 17 / 230
» Transformation of Access Rights
Sort
View
SAC
2010
ACM
14 years 3 months ago
The semantics of personalised web accessibility assessment
This paper presents SAAF, a Semantic Accessibility Assessment Framework for personalised Web accessibility assessment procedures. We define four domains as a way to decouple gene...
Rui Lopes, Konstantinos Votis, Luís Carri&c...
JSA
2007
84views more  JSA 2007»
13 years 8 months ago
Optimizing data structures at the modeling level in embedded multimedia
Traditional design techniques for embedded systems apply transformations on the source code to optimize hardwarerelated cost factors. Unfortunately, such transformations cannot ad...
Marijn Temmerman, Edgar G. Daylight, Francky Catth...
RULEML
2007
Springer
14 years 2 months ago
Specifying Process-Aware Access Control Rules in SBVR
Abstract. Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying bu...
Stijn Goedertier, Christophe Mues, Jan Vanthienen
SASN
2006
ACM
14 years 2 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
IJSN
2006
76views more  IJSN 2006»
13 years 8 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li