Sciweavers

1147 search results - page 44 / 230
» Transformation of Access Rights
Sort
View
SP
1996
IEEE
14 years 25 days ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
3DPVT
2006
IEEE
186views Visualization» more  3DPVT 2006»
14 years 2 months ago
Resolution Scalable Coding and Region of Interest Access with Three-Dimensional SBHP Algorithm
A low-complexity three-dimensional image compression algorithm based on wavelet transforms and set-partitioning strategy is presented. The Subband Block Hierarchial Partitioning (...
Ying Liu, William A. Pearlman
ECOOP
1999
Springer
14 years 29 days ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
FOSSACS
2005
Springer
14 years 2 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
MM
2003
ACM
131views Multimedia» more  MM 2003»
14 years 1 months ago
Enhancing web accessibility
This demonstration will illustrate the key technical and user interface aspects of the Web Adaptation Technology. Various transformations underlying the system will be shown that ...
Alison Lee, Vicki L. Hanson