Sciweavers

354 search results - page 15 / 71
» Key management for content access control in a hierarchy
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
14 years 11 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
ISSA
2004
14 years 11 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
LWA
2007
14 years 11 months ago
Conceptual Clustering of Social Bookmarking Sites
Abstract: Currently, social bookmarking systems provide intuitive support for browsing locally their content. A global view is usually presented by the tag cloud of the system, but...
Miranda Grahl, Andreas Hotho, Gerd Stumme
CASSIS
2005
Springer
15 years 3 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
ENTCS
2006
140views more  ENTCS 2006»
14 years 9 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...