Sciweavers

2024 search results - page 231 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
115
Voted
SOUPS
2010
ACM
15 years 7 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill
145
Voted
WETICE
2006
IEEE
15 years 9 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow
131
Voted
TLT
2008
92views more  TLT 2008»
15 years 2 months ago
Lifelong Learner Modeling for Lifelong Personalized Pervasive Learning
Pervasive and ubiquitous computing has the potential to make huge changes in the ways that we will learn throughout our lives. This paper presents a vision for the lifelong user mo...
Judy Kay
152
Voted
JSW
2008
240views more  JSW 2008»
15 years 3 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
137
Voted
SAC
1997
ACM
15 years 7 months ago
The RasDaMan approach to multidimensional database management
Multidimensional discrete data (MDD), i.e., arrays of arbitrary size, dimension, and base type, are receiving growing attention among the database community. MDD occur in a variet...
Peter Baumann, Paula Furtado, Roland Ritsch, Norbe...