Back to Results
First PageMeta Content
Xerox DocuShare / Photo sharing / Shared resource / Group / Filesystem permissions / Access control list / Folder / File system / Flickr / Computing / Information technology management / World Wide Web


How Users Use Access Control D. K. Smetters Nathan Good PARC
Add to Reading List

Document Date: 2009-05-30 23:35:56


Open Document

File Size: 326,03 KB

Share Result on Facebook

City

Palo Alto / Mountain View / /

Company

Human Resources / Xerox / User/Machine Systems / Microsoft Windows / R Unix / Windows / Members Per Group / /

Country

United States / /

/

Event

Reorganization / FDA Phase / Layoffs / /

Facility

store URLs / /

IndustryTerm

web interface / sharing systems / file sharing technologies / access control technologies / document sharing systems / data collection software / non-empty groups / content management / access control groups / functional groups / access control systems / study protocol / web browser / human information processing / automated data mining techniques / access systems / media sharing applications / networked file systems / coupled groups / discretionary systems / file systems / content sharing systems / insurance forms / tool validating tool text file validating tool / user groups / defined using a web interface / /

OperatingSystem

Unix / Microsoft Windows / /

Person

Churchill / /

Position

author / administrator / representative / General / senior manager / /

Product

DocuShare / Unix / Xerox DocuShare / SMB / /

ProgrammingLanguage

Java / /

Technology

study protocol / access control technologies / content management / Java / Unix / content management system / API / Existing technologies / USA smetters@parc.com ABSTRACT Existing technologies / SMB protocol / file sharing / file sharing technologies / data mining / cell phones / mobile phones / Operating Systems / access control list / /

SocialTag