Sciweavers

1627 search results - page 115 / 326
» On context in authorization policy
Sort
View
COLCOM
2007
IEEE
14 years 5 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
ESORICS
2005
Springer
14 years 4 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone
EUC
2004
Springer
14 years 4 months ago
Securing Communications in the Smart Home
As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such ...
Patroklos G. Argyroudis, Donal O'Mahony
ADCM
2000
57views more  ADCM 2000»
13 years 10 months ago
Polynomial frames on the sphere
We introduce a class of polynomial frames suitable for analyzing data on the surface of the unit sphere of a Euclidean space. Our frames consist of polynomials, but are well local...
Hrushikesh Narhar Mhaskar, Francis J. Narcowich, J...
WWW
2010
ACM
14 years 5 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...