Sciweavers

499 search results - page 28 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
14 years 10 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
SAJ
2002
97views more  SAJ 2002»
13 years 10 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
CCS
2007
ACM
14 years 2 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
CAISE
2006
Springer
14 years 2 months ago
Integration of heterogeneous BPM Schemas: The Case of XPDL and BPEL
Heterogeneous Business Process Modeling (BPM) schemas have been a problem for business process management throughout the last couple of years. Although there are several standardiz...
Thomas Hornung, Agnes Koschmider, Jan Mendling
ASPLOS
2006
ACM
14 years 4 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...