Sciweavers

830 search results - page 131 / 166
» Owned Policies for Information Security
Sort
View
ESORICS
2005
Springer
15 years 5 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone
IDTRUST
2009
ACM
15 years 6 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
SACMAT
2011
ACM
14 years 2 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 6 months ago
A Game Theoretic Solution for Exploiting Multiuser Diversity in Cooperative Slotted Aloha
— In multiuser systems, multiuser diversity gains can be achieved by assigning channels to users with higher channel quality. To avoid the extensive information exchange required...
Cristina Comaniciu, Dandan Wang, Hlaing Minn, Naof...
DCOSS
2005
Springer
15 years 5 months ago
Collaborative Sensing Using Sensors of Uncoordinated Mobility
Abstract— Wireless sensor networks are useful for monitoring physical parameters and detecting objects or substances in an area. Most ongoing research consider the use of either ...
Kuang-Ching Wang, Parmesh Ramanathan