Sciweavers

177 search results - page 18 / 36
» Towards temporal access control in cloud computing
Sort
View
EL
2011
86views more  EL 2011»
13 years 11 months ago
The use of metadata and preservation methods for continuous access to digital data
Data loss prevention starts with the creation of a digital object. However, methods to minimize the loss of digital data are often ignored, the use of metadata structures embedded...
Ria Groenewald, Amelia Breytenbach
COLCOM
2007
IEEE
15 years 6 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
WIKIS
2010
ACM
14 years 9 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
COMGEO
2011
ACM
14 years 3 months ago
Physical world as an internet of things
ABSTRACT . Categories and Subject Descriptors K. Computing Milieux K.m MISCELLANEOUS General Terms Theory Keywords Cyber-physics, Internet of Things, Quantum computing Cloud Comput...
Simon Berkovich
ICDCS
1999
IEEE
15 years 4 months ago
Proxy Cache Coherency and Replacement - Towards a More Complete Picture
This work studies the interaction of Web proxy cache coherency and replacement policies using trace-driven simulations. We specifically examine the relative importance of each typ...
Balachander Krishnamurthy, Craig E. Wills