Sciweavers

1440 search results - page 4 / 288
» Third-Party Flow Control
Sort
View
89
Voted
SAJ
2002
97views more  SAJ 2002»
14 years 10 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
68
Voted
ICC
2007
IEEE
15 years 4 months ago
Framework for Agent-Based Role Delegation
— This paper describes a framework for addressing the administration of role delegation introduced in the wellknown role-based access control model (RBAC). More specifically, thi...
Ezedin Barka, Ravi S. Sandhu
AIPS
2006
14 years 11 months ago
Run-Time Monitoring of the Execution of Plans for Web Service Composition
While a lot of work has been done on the problem of the automated generation of plans that compose web services, the problem of monitoring their execution has still to be investig...
Fabio Barbon, Paolo Traverso, Marco Pistore, Miche...
119
Voted
IJCMAM
2010
160views more  IJCMAM 2010»
14 years 7 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
88
Voted
CONCUR
2004
Springer
15 years 3 months ago
Type Based Discretionary Access Control
Abstract. Discretionary Access Control (DAC) systems provide powerful mechanisms for resource management based on the selective distribution of capabilities to selected classes of ...
Michele Bugliesi, Dario Colazzo, Silvia Crafa