Sciweavers

1422 search results - page 243 / 285
» Information security and risk management
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
CCGRID
2005
IEEE
14 years 2 months ago
Scaling NFSv4 with parallel file systems
Large grid installations require global access to massive data stores. Parallel file systems give high throughput within a LAN, but cross-site data transfers lack seamless integra...
Dean Hildebrand, Peter Honeyman
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang
SAC
2005
ACM
14 years 2 months ago
SVD-based collaborative filtering with privacy
Collaborative ļ¬ltering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
ATAL
2005
Springer
14 years 2 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...