Sciweavers

448 search results - page 15 / 90
» Who is in Control
Sort
View
OOPSLA
1992
Springer
15 years 8 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
HCI
2001
15 years 5 months ago
Early experiences using visual tracking for computer access by people with profound physical disabilities
A dozen people who cannot speak and have very limited voluntary muscle control because of cerebral palsy or traumatic brain injury have tried using a new technology called the Cam...
James Gips, Margrit Betke, Philip A. DiMattia
CSFW
2010
IEEE
15 years 8 months ago
Towards a Formal Foundation of Web Security
—We propose a formal model of web security based straction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We id...
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John ...
SOUPS
2009
ACM
15 years 10 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
160
Voted
SACMAT
2003
ACM
15 years 9 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons