Sciweavers

3899 search results - page 690 / 780
» Argumentation for Access Control
Sort
View
CCS
2008
ACM
14 years 4 days ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
ERCIMDL
2006
Springer
174views Education» more  ERCIMDL 2006»
14 years 2 days ago
Using MILOS to Build a Multimedia Digital Library Application: The PhotoBook Experience
Abstract. The digital library field is recently broadening its scope of applicability and it is also continuously adapting to the frequent changes occurring in the internet society...
Giuseppe Amato, Paolo Bolettieri, Franca Debole, F...
COORDINATION
2008
Springer
13 years 12 months ago
Encrypted Shared Data Spaces
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
13 years 11 months ago
Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners
Abstract. Given a directed graph G = (V, E) and an integer k 1, a ktransitive-closure-spanner (k-TC-spanner) of G is a directed graph H = (V, EH ) that has (1) the same transitive...
Arnab Bhattacharyya, Elena Grigorescu, Madhav Jha,...
WICON
2008
13 years 11 months ago
The effect of cooperation at the network protocol level
Abstract--There has been a great deal of attention on cooperative communication which exploits the spatial diversity among antennas belonging to multiple terminals. Most of the exi...
Beiyu Rong, Anthony Ephremides