Sciweavers

123 search results - page 3 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 8 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
CSCW
1998
ACM
13 years 11 months ago
Cooperative Knowledge Work and Practices of Trust: Sharing Environmental Planning Data Sets
Knowledge communities of all kinds have social and material practices for deciding what is known and who is to be trusted. In this paper, we address a specific kind of knowledge w...
Nancy A. Van House, Mark H. Butler, Lisa R. Schiff
POLICY
2007
Springer
14 years 1 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
KDD
2002
ACM
286views Data Mining» more  KDD 2002»
14 years 7 months ago
Object Boundary Detection For Ontology-Based Image Classification
Technology in the field of digital media generates huge amounts of non-textual information, audio, video, and images, along with more familiar textual information. The potential f...
Lei Wang, Latifur Khan, Casey Breen