Sciweavers

4445 search results - page 122 / 889
» Reflective Authorization Systems
Sort
View
IFIP
2004
Springer
15 years 9 months ago
A Logic for Auditing Accountability in Decentralized Systems
We propose a language that allows agents to distribute data with usage policies in a decentralized architecture. In our framework, the compliance with usage policies is not enforce...
Ricardo Corin, Sandro Etalle, J. I. den Hartog, Ga...
ACSAC
1999
IEEE
15 years 8 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
BMVC
1998
15 years 5 months ago
Automatic Processing of Document Annotations
A common authoring technique involves making annotations on a printed draft and then typing the corrections into a computer at a later date. In this paper, we describe a system th...
Jacob Stevens, Andrew H. Gee, Chris Dance
EUROCRYPT
2011
Springer
14 years 7 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
CHI
2009
ACM
16 years 5 months ago
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust
This paper examines a visual design element unique to situated, hot-spot style, services: locativeness. This is the extent to which the media representing a service relates to its...
Vassilis Kostakos, Ian Oakley