Sciweavers

670 search results - page 34 / 134
» A RBAC-Based Policy Information Base
Sort
View
ESORICS
2002
Springer
14 years 10 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
EDOC
2006
IEEE
14 years 4 months ago
Net-Centric Information Management
Information sharing is a key tenet of network-centric warfare (NCW). Information sharing succeeds when the right information is provided to the right people at the right time and ...
Scott Renner
WWW
2008
ACM
14 years 11 months ago
Recrawl scheduling based on information longevity
It is crucial for a web crawler to distinguish between ephemeral and persistent content. Ephemeral content (e.g., quote of the day) is usually not worth crawling, because by the t...
Christopher Olston, Sandeep Pandey
CCS
2006
ACM
14 years 2 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
ICCCI
2010
Springer
13 years 9 months ago
Strategic Health Information Management and Forecast: The Birdwatching Approach
Abstract. To facilitate communication and the exchange of information between patients, nurses, lab technicians, health insurers, physicians, policy makers, and existing knowledge-...
Arash Shaban-Nejad, Volker Haarslev