Sciweavers

1779 search results - page 210 / 356
» A Formal Model of Data Privacy
Sort
View
ESWS
2008
Springer
15 years 6 months ago
Semantic Email as a Communication Medium for the Social Semantic Desktop
In this paper, we introduce a formal email workflow model based on traditional email, which enables the user to define and execute ad-hoc workflows in an intuitive way. This model ...
Simon Scerri, Siegfried Handschuh, Stefan Decker
126
Voted
CSFW
2009
IEEE
15 years 11 months ago
Policy Compliance in Collaborative Systems
When collaborating agents share sensitive information to achieve a common goal it would be helpful to them to decide whether doing so will lead to an unwanted release of confiden...
Max I. Kanovich, Paul Rowe, Andre Scedrov
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 8 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
SOUPS
2009
ACM
15 years 11 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
ISI
2008
Springer
15 years 4 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....