Sciweavers

354 search results - page 27 / 71
» Key management for content access control in a hierarchy
Sort
View
ICOODB
2010
171views Database» more  ICOODB 2010»
14 years 7 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...
INFOCOM
2007
IEEE
15 years 4 months ago
CR Switch: A Load-Balanced Switch with Contention and Reservation
—Load-balanced switches have received a great deal of attention recently as they are much more scalable than other existing switch architectures in the literature. However, as th...
Chao-Lin Yu, Cheng-Shang Chang, Duan-Shin Lee
EUROSEC
2009
ACM
15 years 4 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
SACMAT
2005
ACM
15 years 3 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
COLCOM
2009
IEEE
15 years 2 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...