Sciweavers

979 search results - page 92 / 196
» Developing Dynamic Security Policies
Sort
View
ISW
2009
Springer
14 years 5 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 5 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
CSREASAM
2006
14 years 17 days ago
Trusted Storage: Focus on Use Cases
This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
Robert Thibadeau, Michael Willett
HICSS
2006
IEEE
180views Biometrics» more  HICSS 2006»
14 years 5 months ago
Knowledge Dynamics in Regional Economies: A Research Framework
This paper addresses challenges associated with the dynamics of knowledge in clusters and regional networks. It develops a conceptual framework, a methodology and a research agend...
Ramon O'Callaghan, Rafel Andreu
IJFIPM
2008
156views more  IJFIPM 2008»
13 years 11 months ago
Dynamic intimate contact social networks and epidemic interventions
Abstract: Sexually transmitted diseases and infections are, by definition, transferred among intimate social settings. Although the circumstances under which these social settings ...
Courtney Corley, Armin R. Mikler, Diane J. Cook, K...