Sciweavers

670 search results - page 65 / 134
» A RBAC-Based Policy Information Base
Sort
View
AI
2000
Springer
13 years 10 months ago
Learning to construct knowledge bases from the World Wide Web
The World Wide Web is a vast source of information accessible to computers, but understandable only to humans. The goal of the research described here is to automatically create a...
Mark Craven, Dan DiPasquo, Dayne Freitag, Andrew M...
HICSS
2009
IEEE
92views Biometrics» more  HICSS 2009»
14 years 2 months ago
An Assessment of Venues Providing Public Access to ICT: A Tale of 25 Countries
This paper is based on a comparative study of venues that provide public access to information and communication technologies in 25 countries. We study how diverse people can and ...
Christopher Coward, Ricardo Gomez, Rucha Ambikar
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 5 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
SEC
2007
14 years 2 days ago
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
Location-Based Access Control (LBAC) systems support the evaluation of conditions on locations in the enforcement of access control policies. The ability to evaluate conditions on ...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
CCS
2006
ACM
14 years 2 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...