Sciweavers

364 search results - page 7 / 73
» Privacy Requirements Implemented with a JavaCard
Sort
View
CODASPY
2012
13 years 5 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
AGENTS
2001
Springer
15 years 1 months ago
Implementing soft real-time agent control
Real-time control has become increasingly important as technologies are moved from the lab into real world situations. The complexity associated with these systems increases as co...
Régis Vincent, Bryan Horling, Victor R. Les...
ICDE
2005
IEEE
137views Database» more  ICDE 2005»
15 years 10 months ago
Extending Relational Database Systems to Automatically Enforce Privacy Policies
Databases are at the core of successful businesses. Due to the voluminous stores of personal data being held by companies today, preserving privacy has become a crucial requiremen...
Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry...
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
15 years 3 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...
RE
2008
Springer
14 years 9 months ago
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility
U.S. laws and regulations are designed to support broad societal goals, such as accessibility, privacy and safety. To demonstrate that a product complies with these goals, busines...
Travis D. Breaux, Annie I. Antón, Kent Bouc...