Sciweavers

282 search results - page 22 / 57
» Private Policy Negotiation
Sort
View
CCS
2004
ACM
15 years 3 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
ECAI
2006
Springer
15 years 1 months ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer
77
Voted
ISI
2006
Springer
14 years 9 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
73
Voted
SEMWEB
2004
Springer
15 years 3 months ago
Trust Negotiation for Semantic Web Services
Semantic Web Services enable the dynamic discovery of services based on a formal, explicit specification of the requester needs. The actual Web Services that will be used to satis...
Daniel Olmedilla, Rubén Lara, Axel Polleres...
JIS
2007
74views more  JIS 2007»
14 years 9 months ago
Fifty years of scientific and technical information policy in France (1955 - 2005)
Over the last fifty years, French public authorities have played a major role in developing a policy for scientific and technical information (STI) in France. Four distinct period...
Serge Cacaly, Yves-François Le Coadic