Sciweavers

705 search results - page 66 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
CCS
2005
ACM
15 years 3 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
ISI
2005
Springer
15 years 3 months ago
Map-Mediated GeoCollaborative Crisis Management
Managing crises requires collecting geographical intelligence and making spatial decisions through collaborative efforts among multiple, distributed agencies and task groups. Crisi...
Guoray Cai, Alan M. MacEachren, Isaac Brewer, Mich...
WPES
2005
ACM
15 years 3 months ago
Mining rule semantics to understand legislative compliance
Organizations in privacy-regulated industries (e.g. healthcare and financial institutions) face significant challenges when developing policies and systems that are properly align...
Travis D. Breaux, Annie I. Antón
HPDC
2008
IEEE
15 years 4 months ago
The performance of bags-of-tasks in large-scale distributed systems
Ever more scientists are employing large-scale distributed systems such as grids for their computational work, instead of tightly coupled high-performance computing systems. Howev...
Alexandru Iosup, Omer Ozan Sonmez, Shanny Anoep, D...
ICSE
2005
IEEE-ACM
15 years 10 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...