Sciweavers

872 search results - page 24 / 175
» An Access Control Language for a General Provenance Model
Sort
View
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
DEXAW
2003
IEEE
137views Database» more  DEXAW 2003»
14 years 25 days ago
Applying the Semantic Web Layers to Access Control
The Semantic Web, also known as the Web of meaning, is considered the new generation of the Web. Its objective is to enable computers and people to work in cooperation. A requisit...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
CCS
2009
ACM
14 years 8 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
ICWE
2005
Springer
14 years 1 months ago
An Article Language Model for BBS Search
Bulletin Board Systems (BBS), similar to blogs, newsgroups, online forums, etc., are online broadcasting spaces where people can exchange ideas and make announcements. As BBS are b...
Jingfang Xu, Yangbo Zhu, Xing Li