Sciweavers

670 search results - page 25 / 134
» A RBAC-Based Policy Information Base
Sort
View
AINA
2007
IEEE
14 years 3 months ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
MODELLIERUNG
2008
14 years 17 days ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
CIKM
2009
Springer
14 years 5 months ago
Applying differential privacy to search queries in a policy based interactive framework
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Palanivel Balaji Kodeswaran, Evelyne Viegas
SACMAT
2004
ACM
14 years 4 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
JIT
2005
Springer
130views Database» more  JIT 2005»
14 years 4 months ago
Policies for an AOP Based Auto-Adaptive Framework
Dynamic AOP has been identified as a useful technique to implement an auto-adaptive framework. To supplement this policies based upon EventCondition-Action rules are used to specif...
Phil Greenwood, Lynne Blair