Sciweavers

43 search results - page 7 / 9
» Negotiation of Prohibition: An Approach Based on Policy Rewr...
Sort
View
ATAL
2008
Springer
13 years 7 months ago
Multi agent based simulation of transport chains
An agent-based tool for micro-level simulation of transport chains (TAPAS) is described. It is more powerful than traditional approaches as it is able to capture the interactions ...
Paul Davidsson, Johan Holmgren, Jan A. Persson, Li...
GIS
2010
ACM
13 years 3 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
ESORICS
2006
Springer
13 years 9 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
ESORICS
2005
Springer
13 years 11 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 6 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis