Sciweavers

370 search results - page 34 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
BIS
2007
120views Business» more  BIS 2007»
15 years 3 months ago
Security Issues for the Use of Semantic Web in E-Commerce
As the ontologies are the pivotal element of the Semantic Web in E-Commerce, it is necessary to protect the ontology’s integrity and availability. In addition, both suppliers and...
Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar ...
IJCMAM
2010
160views more  IJCMAM 2010»
14 years 11 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
ESAW
2008
Springer
15 years 3 months ago
Peer Pressure as a Driver of Adaptation in Agent Societies
We consider a resource access control scenario in an open multi-agent system. We specify a mutable set of rules to determine how resource allocation is decided, and minimally assum...
Hugo Carr, Jeremy V. Pitt, Alexander Artikis
IJISEC
2002
52views more  IJISEC 2002»
15 years 1 months ago
Securing SOAP e-services
Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
CCS
2010
ACM
15 years 2 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...