Sciweavers

926 search results - page 143 / 186
» Policy framings for access control
Sort
View
NDSS
2000
IEEE
15 years 2 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...
MEDINFO
2007
122views Healthcare» more  MEDINFO 2007»
14 years 11 months ago
Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities
Economies of scale, corporate partnerships and a need to increase the efficiency of Information Technology in the Healthcare sector are leading to the construction of Regional Hea...
Tyrone Grandison, Srivatsava Ranjit Ganta, Uri Bra...
128
Voted
ICS
2011
Tsinghua U.
14 years 1 months ago
Page placement in hybrid memory systems
Phase-Change Memory (PCM) technology has received substantial attention recently. Because PCM is byte-addressable and exhibits access times in the nanosecond range, it can be used...
Luiz E. Ramos, Eugene Gorbatov, Ricardo Bianchini
82
Voted
ICEB
2004
152views Business» more  ICEB 2004»
14 years 11 months ago
A Multi-Agent System for E-Business Processes Monitoring in a Web-Based Environment
In this paper, we present a multi-agent system MAGS for the e-business processes monitoring in a web-based environment. We classify the types of agents in MAGS by their monitoring...
Xinyu Zhao, Cen Wu, Runjie Zhang, Chen Zhao, Zuoqu...
77
Voted
RBAC
1998
84views more  RBAC 1998»
14 years 11 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park