Sciweavers

427 search results - page 22 / 86
» Monitoring and controlling of a multi - agent based workflow...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
ISI
2004
Springer
14 years 28 days ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
AVSS
2003
IEEE
14 years 26 days ago
A Scalable Image-Based Multi-Camera Visual Surveillance System
In this paper, we aim to achieve scalability and wider scene coverage through the use of multiple cameras in an outdoor visual surveillance system. Only image-based information is...
Ser-Nam Lim, Larry S. Davis, Ahmed M. Elgammal
CSFW
2007
IEEE
14 years 1 months ago
Dynamic Dependency Monitoring to Secure Information Flow
Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinc...
Paritosh Shroff, Scott F. Smith, Mark Thober
FC
1999
Springer
184views Cryptology» more  FC 1999»
13 years 12 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma