Sciweavers

2009 search results - page 329 / 402
» A privacy-aware access control system
Sort
View
DRM
2005
Springer
14 years 2 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
ICTAC
2005
Springer
14 years 2 months ago
Toward an Abstract Computer Virology
n abstract computer virology G. Bonfante, M. Kaczmarek, and J-Y Marion Loria, Calligramme project, B.P. 239, 54506 VandÅ“uvre-l`es-Nancy C´edex, France, and ´Ecole Nationale SupÂ...
Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves ...
SDMW
2005
Springer
14 years 2 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
VIZSEC
2005
Springer
14 years 2 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
SIGUCCS
2004
ACM
14 years 2 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson