Sciweavers

744 search results - page 69 / 149
» The Traust Authorization Service
Sort
View
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 4 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
POLICY
2004
Springer
15 years 3 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
JLBS
2008
82views more  JLBS 2008»
14 years 10 months ago
Leveraging explicitly disclosed location information to understand tourist dynamics: a case study
In recent years, the large deployment of mobile devices has led to a massive increase in the volume of records of where people have been and when they were there. The analysis of t...
Fabien Girardin, Filippo Dal Fiore, Carlo Ratti, J...
JWSR
2008
145views more  JWSR 2008»
14 years 10 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton
SRDS
2007
IEEE
15 years 4 months ago
PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations
The increasing complexity and dynamics of grid environments have posed great challenges for secure and privacy-preserving collaboration in a virtual organization. In this paper, w...
Jianxin Li, Jinpeng Huai, Chunming Hu