Sciweavers

1228 search results - page 112 / 246
» Copyright
Sort
View
TRUSTBUS
2010
Springer
14 years 8 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
TRUSTBUS
2010
Springer
14 years 8 months ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen
IWPSE
2010
IEEE
14 years 8 months ago
Evolutional analysis of licenses in FOSS
FOSS (Free and Open Source System) is repeatedly modied and reused by other FOSS or proprietary software systems. They are released to others under specic licenses whose terms and...
Yuki Manabe, Yasuhiro Hayase, Katsuro Inoue
95
Voted
CASCON
2010
188views Education» more  CASCON 2010»
14 years 5 months ago
First symposium on the Personal Web
The First Symposium on the Personal Web is colocated with CASCON 2010 and is sponsored by IBM CAS Research. This symposium includes key researchers and practitioners in a range of...
Mark H. Chignell, James R. Cordy, Joanna W. Ng, Ye...
117
Voted
DAM
2011
14 years 5 months ago
A study of 3-arc graphs
An arc of a graph is an oriented edge and a 3-arc is a 4-tuple (v, u, x, y) of vertices such that both (v, u, x) and (u, x, y) are paths of length two. The 3-arc graph of a graph ...
Martin Knor, Guangjun Xu, Sanming Zhou