Sciweavers

273 search results - page 32 / 55
» Formal Implementation of Network Security Policies
Sort
View
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 10 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ECIS
2003
13 years 11 months ago
The role of informal networks in knowledge sharing
The application of a knowledge management strategy does not take place in a vacuum. Successfully meeting objectives of a knowledge management strategy may depend not only on the e...
Tony Jewels, Alan Underwood, Carmen de Pablos Here...
HPCN
1999
Springer
14 years 2 months ago
A Flexible Security System for Metacomputing Environments
Abstract. A metacomputing environment is a collection of geographically distributed resources (people, computers, devices, databases) connected by one or more high-speed networks, ...
Adam Ferrari, Frederick Knabe, Marty Humphrey, Ste...
ACSAC
2004
IEEE
14 years 1 months ago
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type
One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using u...
Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. ...
CSE
2009
IEEE
14 years 4 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...