Sciweavers

TRUSTBUS
2010
Springer
13 years 2 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
TRUSTBUS
2010
Springer
13 years 2 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
TRUSTBUS
2010
Springer
13 years 2 months ago
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution
Abstract. Current challenges on the markets cause companies to interact with one another and strive after becoming members of virtual organizations assuming that in doing so they c...
Christoph Fritsch, Günther Pernul
TRUSTBUS
2010
Springer
13 years 2 months ago
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression
We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging so...
Javier Parra-Arnau, David Rebollo-Monedero, Jordi ...
TRUSTBUS
2010
Springer
13 years 2 months ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen
TRUSTBUS
2010
Springer
13 years 2 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall