Sciweavers

726 search results - page 6 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
ADC
2007
Springer
150views Database» more  ADC 2007»
14 years 1 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
SACMAT
2005
ACM
14 years 1 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
MOBICOM
1997
ACM
13 years 11 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 7 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 7 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao