Sciweavers

2978 search results - page 523 / 596
» A product-based information management approach
Sort
View
ESORICS
2007
Springer
15 years 6 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
SEMWEB
2007
Springer
15 years 6 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 6 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter
ICDCS
2006
IEEE
15 years 6 months ago
Utility Optimization for Event-Driven Distributed Infrastructures
Event-driven distributed infrastructures are becoming increasingly important for information dissemination and application integration. We examine the problem of optimal resource ...
Cristian Lumezanu, Sumeer Bhola, Mark Astley
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
15 years 6 months ago
Content and Context Aware Networking Using Semantic Tagging
Today’s model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple“best-effort”,“data agnostic” communication med...
Sethuram Balaji Kodeswaran, Anupam Joshi