Sciweavers

670 search results - page 85 / 134
» A RBAC-Based Policy Information Base
Sort
View
CSE
2009
IEEE
14 years 5 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
IPPS
2002
IEEE
14 years 3 months ago
Cluster Load Balancing for Fine-Grain Network Services
This paper studies cluster load balancing policies and system support for fine-grain network services. Load balancing on a cluster of machines has been studied extensively in the...
Kai Shen, Tao Yang, Lingkun Chu
MOBISYS
2003
ACM
14 years 10 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
CODES
2005
IEEE
14 years 4 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
WECWIS
2009
IEEE
142views ECommerce» more  WECWIS 2009»
14 years 5 months ago
DySCon: Dynamic Sharing Control for Distributed Team Collaboration in Networked Enterprises
– Networked enterprises create virtual teams of distributed experts belonging to different enterprises where one user can be part of multiple teams; How to effectively control th...
Ahmad Kamran Malik, Hong Linh Truong, Schahram Dus...