Sciweavers

128 search results - page 20 / 26
» Preventing Information Inference in Access Control
Sort
View
CCS
2008
ACM
15 years 1 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
ICDCS
1999
IEEE
15 years 3 months ago
Beyond the Black Box: Event-based Inter-Process Communication in Process Support Systems
Existing workflow management systems encapsulate the data and behavior of a process within its execution scope, preventing other processes from accessing this information until th...
Claus Hagen, Gustavo Alonso
AINA
2007
IEEE
15 years 3 months ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
CIKM
2009
Springer
15 years 5 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
72
Voted
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 4 months ago
The Role of Organizational Culture in the Management of Clinical e-health Systems
The research here presented focuses upon the informal, social, and cultural side of managerial coordination and control as manifested in clinical e-health systems. Specifically, t...
David Bangert, Robert Doktor