Sciweavers

346 search results - page 29 / 70
» A Privacy Policy Model for Enterprises
Sort
View
CCS
2006
ACM
13 years 11 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
An economic model of portal competition under privacy concerns
Due to inherent privacy concerns, online personalization services such as those offered through toolbars and desktop widgets are characterized by "no-free-disposal" (NFD...
Ramnath K. Chellappa, Raymond G. Sin
ICMCS
2005
IEEE
72views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Revenue Aware Preemption Policy in Multimedia Communication Networks
Preemption of low priority call connections to accommodate high priority call connections is a widely recommended technique in a multimedia communication network. A preemption pol...
Iftekhar Ahmad, Joarder Kamruzzaman, Srinivas Aswa...
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 9 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
ACSAC
1999
IEEE
13 years 12 months ago
Napoleon: A Recipe for Workflow
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...