Sciweavers

4118 search results - page 23 / 824
» Mechanisms for usage control
Sort
View
ENTCS
2007
112views more  ENTCS 2007»
13 years 8 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
ICC
2008
IEEE
14 years 2 months ago
Improving Label Space Usage for Ethernet Label Switched Paths
—Ethernet is becoming the dominant aggregation technology for carrier transport networks; however, as it is a LAN technology, native bridged Ethernet does not fulfill all the ca...
Luis F. Caro, Dimitri Papadimitriou, José-L...
POLICY
2007
Springer
14 years 2 months ago
Data-Purpose Algebra: Modeling Data Usage Policies
Data is often encumbered by restrictions on the ways in which it may be used. These restrictions on usage may be determined by statute, by contract, by custom, or by common decenc...
Chris Hanson, Tim Berners-Lee, Lalana Kagal, Geral...
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 2 months ago
Paper versus Electronic: Challenges Associated with Physicians' Usage of Electronic Medical Records
This study builds on the theory of planned behavior, institutional and diffusion theories to investigate physicians’ attitudes and usage behaviors of electronic medical records ...
Virginia Ilie, James F. Courtney, Craig Van Slyke
GRID
2006
Springer
13 years 8 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...