Sciweavers

922 search results - page 37 / 185
» Attribute based data sharing with attribute revocation
Sort
View
COLCOM
2007
IEEE
15 years 4 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
SACMAT
2005
ACM
15 years 3 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
ESWA
2008
119views more  ESWA 2008»
14 years 9 months ago
Incremental clustering of mixed data based on distance hierarchy
Clustering is an important function in data mining. Its typical application includes the analysis of consumer's materials. Adaptive resonance theory network (ART) is very pop...
Chung-Chian Hsu, Yan-Ping Huang
EOR
2008
112views more  EOR 2008»
14 years 9 months ago
DEA based auctions
We discuss the design of multi-dimensional tender and auction mechanisms that combine Data Envelopment Analysis (DEA) and auction theory. The mechanisms select an agent to perform...
Peter Bogetoft, Kurt Nielsen
ISMB
1993
14 years 11 months ago
Knowledge-Based Generation of Machine-Learning Experiments: Learning with DNA Crystallography Data
Thoughit has been possible in the past to learn to predict DNAhydration patterns from crystallographic data, there is ambiguity in the choice of training data (both in terms of th...
Dawn M. Cohen, Casimir A. Kulikowski, Helen Berman