Sciweavers

176 search results - page 32 / 36
» Mobile-driven architecture for managing enterprise security ...
Sort
View
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 1 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
ECEH
2006
155views Healthcare» more  ECEH 2006»
15 years 1 months ago
A Data Network for Health e-Research
: Sharing health data for research purposes across data custodian boundaries poses technical, organisational and ethical challenges. We describe a service oriented architecture for...
Kerry L. Taylor, Christine M. O'Keefe, John Colton...
ACSAC
2007
IEEE
15 years 3 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
113
Voted
SACMAT
2003
ACM
15 years 4 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
CN
2010
100views more  CN 2010»
14 years 11 months ago
A survey of network virtualization
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba