Sciweavers

393 search results - page 38 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
SIGCOMM
2009
ACM
15 years 6 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
CCS
2009
ACM
15 years 6 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 1 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
CCS
2007
ACM
15 years 6 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
MM
2004
ACM
139views Multimedia» more  MM 2004»
15 years 5 months ago
MobShare: controlled and immediate sharing of mobile images
In this paper we describe the design and implementation of a mobile phone picture sharing system MobShare that enables immediate, controlled, and organized sharing of mobile pictu...
Risto Sarvas, Mikko Viikari, Juha Pesonen, Hanno N...