Sciweavers

354 search results - page 45 / 71
» Key management for content access control in a hierarchy
Sort
View
SACMAT
2009
ACM
15 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
OTM
2007
Springer
15 years 3 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
PDP
2003
IEEE
15 years 2 months ago
A multi-tiered agent-based architecture for a cooperative learning environment
: In this paper the problem of educational resource management in a cooperative learning environment is discussed. A task model was elaborated to determine both functional and leve...
Eduardo Sánchez Vila, Manuel Lama, Ricardo ...
CCS
2007
ACM
15 years 3 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
180
Voted
HIPEAC
2011
Springer
13 years 9 months ago
Decoupled zero-compressed memory
For each computer system generation, there are always applications or workloads for which the main memory size is the major limitation. On the other hand, in many cases, one could...
Julien Dusser, André Seznec