Sciweavers

448 search results - page 29 / 90
» Who is in Control
Sort
View
CCS
2006
ACM
15 years 7 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
IVA
2001
Springer
15 years 8 months ago
Papous: The Virtual Storyteller
This paper describes the development of Papous, a Virtual Storyteller. Our ultimate goal is to obtain a synthetic character that tells stories in an expressive and believable way, ...
André Silva, Marco Vala, Ana Paiva
ASSETS
2010
ACM
15 years 4 months ago
Adaptive mappings for mouse-replacement interfaces
Users of mouse-replacement interfaces may have difficulty conforming to the motion requirements of their interface system. We have observed users with severe motor disabilities wh...
John J. Magee, Samuel Epstein, Eric S. Missimer, M...
LWA
2007
15 years 5 months ago
Semantic Perspectives on Knowledge Management and E-Learning
Knowledge Management (KM) and E-Learning (EL) applications interface more and more as their objects of concern consist in ’captured knowledge’ resp. ’learning objects’, i....
Andrea Kohlhase
ISI
2006
Springer
15 years 4 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu