Sciweavers

726 search results - page 30 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
INFOSCALE
2007
ACM
13 years 9 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü
ARESEC
2011
110views more  ARESEC 2011»
12 years 7 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 9 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
MSWIM
2009
ACM
14 years 2 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
HICSS
2006
IEEE
77views Biometrics» more  HICSS 2006»
14 years 1 months ago
System-Wide Replacement Strategy for Substation Protection and Automation Systems
The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electro...
Paul T. Myrda, Eric A. Udren