Sciweavers

304 search results - page 46 / 61
» Future Directions in Role-Based Access Control Models
Sort
View
JCS
2008
69views more  JCS 2008»
14 years 11 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
15 years 3 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
JHSN
2007
105views more  JHSN 2007»
14 years 11 months ago
A priority-aware CSMA/CP MAC protocol for the all-optical IP-over-WDM metropolitan area ring network
Abstract. The paper proposes a priority-aware MAC (Medium Access Control) protocol for a core metropolitan area network in the next generation Internet, which is an OPS (Optical Pa...
Jih-Hsin Ho, Wen-Shyang Hwang, Ce-Kuen Shieh
ECCV
2008
Springer
16 years 1 months ago
Priors for Large Photo Collections and What They Reveal about Cameras
A large photo collection downloaded from the internet spans a wide range of scenes, cameras, and photographers. In this paper we introduce several novel priors for statistics of su...
Sujit Kuthirummal, Aseem Agarwala, Dan B. Goldman,...
WPES
2003
ACM
15 years 5 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett