Sciweavers

209 search results - page 11 / 42
» Exploiting Information Relationships for Access Control
Sort
View
SAC
2005
ACM
15 years 3 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
CSCWD
2008
Springer
14 years 11 months ago
Authorization approaches for advanced permission-role assignments
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-rol...
Hua Wang, Jianming Yong, Jiuyong Li, Min Peng
80
Voted
CCS
2010
ACM
14 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
IV
2006
IEEE
100views Visualization» more  IV 2006»
15 years 3 months ago
Synchronization Strategies for Spatial Information Organization
Spatial organisation of information objects on a two or three dimensional plane or space has the advantage of revealing the connections between objects easily by spatial proximity...
Dirk Kukulenz, Juliane Kasper
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 1 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson