Sciweavers

434 search results - page 20 / 87
» Security Documentation
Sort
View
111
Voted
ESORICS
2004
Springer
15 years 5 months ago
Portable and Flexible Document Access Control Mechanisms
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). ...
Mikhail J. Atallah, Marina Bykova
MOCOMED
2003
15 years 1 months ago
PDA-based decision support and documentation for transplantation surgery data
: The Transplantation Unit of the Technical University of Munich has developed a mobile, handheld based application for preoperative transplantation patient management. It provides...
Andreas Krause, Alexander T. Mehlhorn, Dominik Har...
WIMOB
2008
IEEE
15 years 6 months ago
Towards an Understanding of Security Concerns within Communities
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
126
Voted
IJSSE
2011
127views more  IJSSE 2011»
14 years 7 months ago
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints
The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
Sean Policarpio, Yan Zhang
101
Voted
CSCWD
2008
Springer
15 years 2 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li