Sciweavers

926 search results - page 135 / 186
» Policy framings for access control
Sort
View
COLCOM
2009
IEEE
15 years 4 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
USS
2008
15 years 2 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
ACSAC
2001
IEEE
15 years 3 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
DSOM
2006
Springer
15 years 1 months ago
A WSDM-Based Architecture for Global Usage Characterization of Grid Computing Infrastructures
Current solutions to characterize grid computing usage are limited in three important aspects. First, they do not provide a global, uniform view of the use of infrastructures compr...
Glauco Antonio Ludwig, Luciano Paschoal Gaspary, G...
ENTCS
2007
199views more  ENTCS 2007»
14 years 11 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson