Sciweavers

164 search results - page 15 / 33
» Audit-based compliance control
Sort
View
SAJ
2002
97views more  SAJ 2002»
13 years 7 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
ICRA
2003
IEEE
115views Robotics» more  ICRA 2003»
14 years 23 days ago
Evolution of the NASA/DARPA robonaut control system
The NASA/DARPA Robonaut system is evolving from a purely teleoperator controlled anthropomorphic robot towards a humanoid system with multiple control pathways. Robonaut is a huma...
Myron A. Diftler, Robert Platt Jr., C. J. Culbert,...
RAS
2002
118views more  RAS 2002»
13 years 7 months ago
Control schemes for teleoperation with time delay: A comparative study
The possibility of operating in remote environments by means of telecontrolled systems has always been considered of relevant interest in robotics. For this reason, in the literat...
Paolo Arcara, Claudio Melchiorri
SAC
2009
ACM
14 years 2 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 2 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang