Sciweavers

371 search results - page 70 / 75
» On the Modeling of Bell-LaPadula Security Policies Using RBA...
Sort
View
IFIP
2005
Springer
15 years 3 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
SAC
2010
ACM
15 years 2 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
WWW
2007
ACM
15 years 10 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
SAC
2006
ACM
15 years 3 months ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...
SPC
2005
Springer
15 years 3 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...