Sciweavers

233 search results - page 28 / 47
» Enforcement of a P3P Privacy Policy
Sort
View
MDM
2004
Springer
14 years 1 months ago
Enabling Context-Aware and Privacy-Conscious User Data Sharing
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...
SAINT
2007
IEEE
14 years 2 months ago
Privacy-Aware Context Discovery for Next Generation Mobile Services
We present a system that enables applications to discover and obtain information that describes the context of a particular entity (e.g., a user or a device). Our system revolves ...
Cristian Hesselman, Henk Eertink, Martin Wibbels
CCS
2009
ACM
14 years 8 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CSFW
2005
IEEE
14 years 1 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
ACSAC
2003
IEEE
14 years 1 months ago
An Editor for Adaptive XML-Based Policy Management of IPsec
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine