Sciweavers

726 search results - page 41 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
ICDCIT
2004
Springer
14 years 29 days ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
CCS
2006
ACM
13 years 11 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ICC
2000
IEEE
128views Communications» more  ICC 2000»
14 years 1 hour ago
Mobility Management Schemes for Support of UPT in Mobile Networks
—When a universal personal telecommunications (UPT) user visits a mobile network, both terminal mobility and personal mobility are involved and it may take a long time for UPT ca...
Sun Jong Kwon, Dan Keun Sung, Min Young Chung
DRM
2003
Springer
14 years 24 days ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein