Sciweavers

209 search results - page 21 / 42
» Exploiting Information Relationships for Access Control
Sort
View
BMCBI
2005
134views more  BMCBI 2005»
13 years 10 months ago
Inherited disorder phenotypes: controlled annotation and statistical analysis for knowledge mining from gene lists
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...
IIR
2010
13 years 9 months ago
Social Approach to Context-Aware Retrieval
In this paper we present a general purpose solution to Web content perusal by means of mobile devices, named Social Context-Aware Browser. This is a novel approach for the informa...
Luca Vassena
POLICY
2001
Springer
14 years 3 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
SISW
2003
IEEE
14 years 4 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
SOUPS
2010
ACM
14 years 2 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill