Sciweavers

660 search results - page 106 / 132
» History-Based Access Control and Secure Information Flow
Sort
View
KES
2008
Springer
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
IEEEARES
2008
IEEE
14 years 2 months ago
Assessing the Reliability and Cost of Web and Grid Orchestrations
Unreliability is a characteristic feature of web and grid based computation: a call to a web or grid site may or may not succeed. An orchestration manager aims to control web or g...
Alan Stewart, Maurice Clint, Terry Harmer, Peter K...
IEEEIAS
2007
IEEE
14 years 1 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
ICSOC
2009
Springer
13 years 5 months ago
Integrating Complex Events for Collaborating and Dynamically Changing Business Processes
Business processes must become agile, respond to changes in the business environment in a timely manner and quickly adapt themselves to new conditions. Event-Driven Business Proces...
Rainer von Ammon, Thomas Ertlmaier, Opher Etzion, ...
DIM
2005
ACM
13 years 9 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...