• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,614
Next 10 →

Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces

by Susan Leigh Star, Karen Ruhleder - Information Systems Research , 1996
"... We analyze a large-scale custom software effort, the Worm Community system (WCS), a collaborative system designed for a geographically dispersed community of geneticists. There were complex challenges in creating this infrastructural tool, ranging from simple lack of resources to complex organizatio ..."
Abstract - Cited by 310 (2 self) - Add to MetaCart
in the Internet and its utilities (1991-1994), and many respondents turned to the World Wide Web for their information exchange. Using Bateson’s model of levels of learning, we analyze the levels of infrastructural complexity involved in system access and designeruser communication. We analyze the connection

Access Control for Collaborative Environments

by Honghai Shen, Prasun Dewan
"... Access control is an indispensable part of any information sharing system. Collaborative environments introduce new requirements for access control, which cannot be met by using existing models developed for non-collaborative domains. We have developed a new access control model for meeting these re ..."
Abstract - Cited by 165 (6 self) - Add to MetaCart
Access control is an indispensable part of any information sharing system. Collaborative environments introduce new requirements for access control, which cannot be met by using existing models developed for non-collaborative domains. We have developed a new access control model for meeting

Toward a model of eye movement control in reading

by Erik D. Reichle, Alexander Pollatsek, Donald L. Fisher, Keith Rayner - PSYCHOLOGICAL REVIEW , 1998
"... The authors present several versions of a general model, titled the E-Z Reader model, of eye movement control in reading. The major goal of the modeling is to relate cognitive processing (specifically aspects of lexical access) to eye movements in reading. The earliest and simplest versions of the m ..."
Abstract - Cited by 210 (23 self) - Add to MetaCart
The authors present several versions of a general model, titled the E-Z Reader model, of eye movement control in reading. The major goal of the modeling is to relate cognitive processing (specifically aspects of lexical access) to eye movements in reading. The earliest and simplest versions

The NIST Model for Role-Based Access Control: Towards A Unified Standard

by Ravi Sandhu, David Ferraiolo , Richard Kuhn
"... This paper describes a unified model for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization. However, lack of a standard model results in uncertainty and confusion about its utility and meaning. The NIST model seeks to resolve this situation by unifying ideas ..."
Abstract - Cited by 198 (3 self) - Add to MetaCart
This paper describes a unified model for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization. However, lack of a standard model results in uncertainty and confusion about its utility and meaning. The NIST model seeks to resolve this situation by unifying

Towards Usage Control Models: Beyond Traditional Access Control

by Jaehong Park, Ravi Sandhu - In Proceedings of 7th ACM Symposium on Access Control Models and Technologies , 2002
"... In this paper we develop the concept of Usage Control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage control concepts have been mentioned off and on in the security literature for some ..."
Abstract - Cited by 102 (4 self) - Add to MetaCart
In this paper we develop the concept of Usage Control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage control concepts have been mentioned off and on in the security literature for some

Poster: Towards an app-driven Mobile Authentication Model

by Nicholas Micallef, Mike Just, Lynne Baillie, Gunes Kayacik
"... By 2013 smart phones are expected to overtake PCs as the main way to access the Web [1]. This means that robust and efficient authentication and access control systems are required since smart phones are increasingly being used to access and store sensitive ..."
Abstract - Add to MetaCart
By 2013 smart phones are expected to overtake PCs as the main way to access the Web [1]. This means that robust and efficient authentication and access control systems are required since smart phones are increasingly being used to access and store sensitive

Certificate-Based Access Control For Widely Distributed Resources

by Mary Thompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith Jackson, Abdelilah Essiari , 1999
"... We have implemented and deployed an access control mechanism that uses digitally-signed certificates to define and enforce an access policy for a set of distributed resources that have multiple, independent and geographically dispersed stakeholders. The stakeholders assert their access requirements ..."
Abstract - Cited by 135 (9 self) - Add to MetaCart
We have implemented and deployed an access control mechanism that uses digitally-signed certificates to define and enforce an access policy for a set of distributed resources that have multiple, independent and geographically dispersed stakeholders. The stakeholders assert their access requirements

Towards An Integrated Information Environment With Open Hypermedia Systems.

by Hugh Davis , Wendy Hall , Ian Heath , Gary Hill, Rob Wilkins , 1993
"... This paper examines open hypermedia systems, and presents the case that such systems provide a step forward for dealing with large, dynamic data sets in distributed, heterogeneous environments by allowing users to access and integrate information and processes in richer and more diverse ways than ha ..."
Abstract - Cited by 134 (33 self) - Add to MetaCart
This paper examines open hypermedia systems, and presents the case that such systems provide a step forward for dealing with large, dynamic data sets in distributed, heterogeneous environments by allowing users to access and integrate information and processes in richer and more diverse ways than

Collaboration and fairness in opportunistic spectrum access

by Haitao Zheng - in Proc. of IEEE International Conference on Communications , 2005
"... Abstract — The Open Spectrum approach to spectrum access can achieve near-optimal spectrum utilization by letting users sense and utilize available spectrum opportunistically. However, naive spectrum assignment can lead to significant interference. We propose a network controlled spectrum access sch ..."
Abstract - Cited by 78 (3 self) - Add to MetaCart
scheme where users behave collaboratively to optimize spectrum allocation for the entire network. We develop a graph-theoretical model to characterize the spectrum access problem under a number of different optimization functions, and devise rules for users to utilize available spectrum while avoiding

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks

by Lijun Chen, Steven H. Low, John C. Doyle - In Proc. IEEE INFOCOM , 2005
"... Abstract—We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix, we formulate resource allocation in the network as a utility maximization problem with constraints that arise from content ..."
Abstract - Cited by 120 (4 self) - Add to MetaCart
Abstract—We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix, we formulate resource allocation in the network as a utility maximization problem with constraints that arise from
Next 10 →
Results 1 - 10 of 1,614
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University