Results 1 - 10
of
1,614
Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces
- Information Systems Research
, 1996
"... We analyze a large-scale custom software effort, the Worm Community system (WCS), a collaborative system designed for a geographically dispersed community of geneticists. There were complex challenges in creating this infrastructural tool, ranging from simple lack of resources to complex organizatio ..."
Abstract
-
Cited by 310 (2 self)
- Add to MetaCart
in the Internet and its utilities (1991-1994), and many respondents turned to the World Wide Web for their information exchange. Using Bateson’s model of levels of learning, we analyze the levels of infrastructural complexity involved in system access and designeruser communication. We analyze the connection
Access Control for Collaborative Environments
"... Access control is an indispensable part of any information sharing system. Collaborative environments introduce new requirements for access control, which cannot be met by using existing models developed for non-collaborative domains. We have developed a new access control model for meeting these re ..."
Abstract
-
Cited by 165 (6 self)
- Add to MetaCart
Access control is an indispensable part of any information sharing system. Collaborative environments introduce new requirements for access control, which cannot be met by using existing models developed for non-collaborative domains. We have developed a new access control model for meeting
Toward a model of eye movement control in reading
- PSYCHOLOGICAL REVIEW
, 1998
"... The authors present several versions of a general model, titled the E-Z Reader model, of eye movement control in reading. The major goal of the modeling is to relate cognitive processing (specifically aspects of lexical access) to eye movements in reading. The earliest and simplest versions of the m ..."
Abstract
-
Cited by 210 (23 self)
- Add to MetaCart
The authors present several versions of a general model, titled the E-Z Reader model, of eye movement control in reading. The major goal of the modeling is to relate cognitive processing (specifically aspects of lexical access) to eye movements in reading. The earliest and simplest versions
The NIST Model for Role-Based Access Control: Towards A Unified Standard
"... This paper describes a unified model for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization. However, lack of a standard model results in uncertainty and confusion about its utility and meaning. The NIST model seeks to resolve this situation by unifying ideas ..."
Abstract
-
Cited by 198 (3 self)
- Add to MetaCart
This paper describes a unified model for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization. However, lack of a standard model results in uncertainty and confusion about its utility and meaning. The NIST model seeks to resolve this situation by unifying
Towards Usage Control Models: Beyond Traditional Access Control
- In Proceedings of 7th ACM Symposium on Access Control Models and Technologies
, 2002
"... In this paper we develop the concept of Usage Control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage control concepts have been mentioned off and on in the security literature for some ..."
Abstract
-
Cited by 102 (4 self)
- Add to MetaCart
In this paper we develop the concept of Usage Control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage control concepts have been mentioned off and on in the security literature for some
Poster: Towards an app-driven Mobile Authentication Model
"... By 2013 smart phones are expected to overtake PCs as the main way to access the Web [1]. This means that robust and efficient authentication and access control systems are required since smart phones are increasingly being used to access and store sensitive ..."
Abstract
- Add to MetaCart
By 2013 smart phones are expected to overtake PCs as the main way to access the Web [1]. This means that robust and efficient authentication and access control systems are required since smart phones are increasingly being used to access and store sensitive
Certificate-Based Access Control For Widely Distributed Resources
, 1999
"... We have implemented and deployed an access control mechanism that uses digitally-signed certificates to define and enforce an access policy for a set of distributed resources that have multiple, independent and geographically dispersed stakeholders. The stakeholders assert their access requirements ..."
Abstract
-
Cited by 135 (9 self)
- Add to MetaCart
We have implemented and deployed an access control mechanism that uses digitally-signed certificates to define and enforce an access policy for a set of distributed resources that have multiple, independent and geographically dispersed stakeholders. The stakeholders assert their access requirements
Towards An Integrated Information Environment With Open Hypermedia Systems.
, 1993
"... This paper examines open hypermedia systems, and presents the case that such systems provide a step forward for dealing with large, dynamic data sets in distributed, heterogeneous environments by allowing users to access and integrate information and processes in richer and more diverse ways than ha ..."
Abstract
-
Cited by 134 (33 self)
- Add to MetaCart
This paper examines open hypermedia systems, and presents the case that such systems provide a step forward for dealing with large, dynamic data sets in distributed, heterogeneous environments by allowing users to access and integrate information and processes in richer and more diverse ways than
Collaboration and fairness in opportunistic spectrum access
- in Proc. of IEEE International Conference on Communications
, 2005
"... Abstract — The Open Spectrum approach to spectrum access can achieve near-optimal spectrum utilization by letting users sense and utilize available spectrum opportunistically. However, naive spectrum assignment can lead to significant interference. We propose a network controlled spectrum access sch ..."
Abstract
-
Cited by 78 (3 self)
- Add to MetaCart
scheme where users behave collaboratively to optimize spectrum allocation for the entire network. We develop a graph-theoretical model to characterize the spectrum access problem under a number of different optimization functions, and devise rules for users to utilize available spectrum while avoiding
Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks
- In Proc. IEEE INFOCOM
, 2005
"... Abstract—We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix, we formulate resource allocation in the network as a utility maximization problem with constraints that arise from content ..."
Abstract
-
Cited by 120 (4 self)
- Add to MetaCart
Abstract—We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix, we formulate resource allocation in the network as a utility maximization problem with constraints that arise from
Results 1 - 10
of
1,614