Sciweavers

1147 search results - page 96 / 230
» Transformation of Access Rights
Sort
View
VLDB
2009
ACM
208views Database» more  VLDB 2009»
14 years 9 months ago
A distributed spatial index for error-prone wireless data broadcast
Information is valuable to users when it is available not only at the right time but also at the right place. To support efficient location-based data access in wireless data broad...
Baihua Zheng, Wang-Chien Lee, Ken C. K. Lee, Dik L...
DRM
2006
Springer
14 years 15 days ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...
ISSA
2004
13 years 10 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
ENTCS
2007
168views more  ENTCS 2007»
13 years 8 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
HT
2005
ACM
14 years 2 months ago
A tactile web browser for the visually disabled
The dissemination of information available through the World Wide Web makes universal access more and more important and supports visually disabled people in their everyday life. ...
Martin Rotard, Sven Knödler, Thomas Ertl