Sciweavers

1147 search results - page 49 / 230
» Transformation of Access Rights
Sort
View
HCI
2001
13 years 10 months ago
Distributed user modelling for universal information access
In a distributed multi-agent based software environment, the traditional monolithic user model ceases to exist and is replaced by user model fragments, developed by the various so...
Julita Vassileva
VMV
2001
126views Visualization» more  VMV 2001»
13 years 10 months ago
Accessing Multi-user Virtual Worlds over IP
The construction of photo-realistic virtual worlds is at reach of current computer graphics. Unfortunately, the philosophy currently adopted for the diffusion of virtual worlds ov...
Riccardo Bernardini, Guido M. Cortelazzo
KES
2008
Springer
13 years 8 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini
WWW
2008
ACM
14 years 9 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
BROADNETS
2007
IEEE
14 years 3 months ago
Pricing spectrum access in cellular CDMA networks with heterogeneous demand
—We consider pricing secondary access to wireless spectrum in cellular CDMA networks. We study the case for a primary license holder interested in leasing the right of providing ...
Ashraf Al Daoud, Murat Alanyali, David Starobinski