Sciweavers

2009 search results - page 317 / 402
» A privacy-aware access control system
Sort
View
ETRICS
2006
14 years 19 days ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ERCIMDL
2000
Springer
98views Education» more  ERCIMDL 2000»
14 years 17 days ago
Personal Data in a Large Digital Library
The RePEc Economics library offers the largest distributed source of freely downloadable scientific research reports in the world. RePEc also contains details about Economics inst...
José Manuel Barrueco Cruz, Markus J. R. Kli...
CHI
1995
ACM
14 years 16 days ago
A Virtual Window on Media Space
The Virtual Window system uses head movements in a local office to control camera movement in a remote office. The result is like a window allowing exploration of remote scenes ra...
William W. Gaver, Gerda Smets, Kees Overbeeke
NSDI
2007
13 years 11 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
MODELLIERUNG
2008
13 years 10 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel