Sciweavers

49 search results - page 8 / 10
» On Modelling Access Policies: Relating Roles to their Organi...
Sort
View
EUC
2008
Springer
13 years 9 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
MM
2004
ACM
106views Multimedia» more  MM 2004»
14 years 25 days ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
COMPSAC
2007
IEEE
14 years 1 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
COORDINATION
2000
Springer
13 years 11 months ago
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach
Coordination and access control are related issues in open distributed agent systems, being both concerned with governing interaction between agents and resources. In particular, w...
Marco Cremonini, Andrea Omicini, Franco Zambonelli
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 7 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi