Sciweavers

1052 search results - page 85 / 211
» Managing User Focused Access to Distributed Knowledge
Sort
View
SRDS
2003
IEEE
15 years 3 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
COLCOM
2007
IEEE
15 years 1 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
BTW
2007
Springer
191views Database» more  BTW 2007»
15 years 4 months ago
The Information Integrator: Using Semantic Technology to provide a single view to distributed data
: For the integration of data that resides in autonomous data sources Software AG uses ontologies. Data source ontologies describe the data sources themselves. Business ontologies ...
Jürgen Angele, Michael Gesmann
SECURWARE
2008
IEEE
15 years 4 months ago
Preventing Insider Information Leakage for Enterprises
Abstract— This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. ...
Imad M. Abbadi, Muntaha Alawneh
SIGMETRICS
2010
ACM
193views Hardware» more  SIGMETRICS 2010»
14 years 10 months ago
Distributed caching over heterogeneous mobile networks
Sharing content over a mobile network through opportunistic contacts has recently received considerable attention. In proposed scenarios, users store content they download in a lo...
Stratis Ioannidis, Laurent Massoulié, Augus...