Sciweavers

706 search results - page 128 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
FTDCS
1997
IEEE
13 years 11 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 7 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
JCP
2007
154views more  JCP 2007»
13 years 7 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 3 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
PODS
2008
ACM
204views Database» more  PODS 2008»
14 years 7 months ago
Annotated XML: queries and provenance
We present a formal framework for capturing the provenance of data appearing in XQuery views of XML. Building on previous work on relations and their (positive) query languages, w...
J. Nathan Foster, Todd J. Green, Val Tannen