Sciweavers

273 search results - page 46 / 55
» Access control enforcement for conversation-based web servic...
Sort
View
SDMW
2005
Springer
14 years 26 days ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ICDE
2006
IEEE
146views Database» more  ICDE 2006»
14 years 8 months ago
Query Selection Techniques for Efficient Crawling of Structured Web Sources
The high quality, structured data from Web structured sources is invaluable for many applications. Hidden Web databases are not directly crawlable by Web search engines and are on...
Ping Wu, Ji-Rong Wen, Huan Liu, Wei-Ying Ma
NDSS
2006
IEEE
14 years 1 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
ERCIMDL
2010
Springer
168views Education» more  ERCIMDL 2010»
13 years 8 months ago
The Planets Testbed - A Collaborative Research Environment for Digital Preservation
The Planets Testbed is an open access web application for the digital preservation community, providing an experimental framework for evaluating preservation tools and approaches i...
Brian Aitken, Seamus Ross, Andrew Lindley, Edith M...
FLOPS
2006
Springer
13 years 11 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov