Sciweavers

1147 search results - page 43 / 230
» Transformation of Access Rights
Sort
View
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 10 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
CIE
2007
Springer
13 years 8 months ago
Multimodal multiplayer tabletop gaming
There is a large disparity between the rich physical interfaces of co-located arcade games and the generic input devices seen in most home console systems. In this paper we argue ...
Edward Tse, Saul Greenberg, Chia Shen, Clifton For...
EDBTW
2004
Springer
14 years 2 months ago
XML-Based Revocation and Delegation in a Distributed Environment
Abstract. The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase o...
Konstantina Stoupa, Athena Vakali, Fang Li, Ioanni...
GG
2004
Springer
14 years 2 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
ICCHP
2004
Springer
14 years 2 months ago
Web Accessibility through Adaptation
Abstract. This paper presents the eAccessibilityEngine tool, which employs adaptation techniques to automatically render web pages accessible by users with different types of disab...
Chrisoula Alexandraki, Alex Paramythis, Napoleon M...