Sciweavers

1627 search results - page 144 / 326
» On context in authorization policy
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
14 years 4 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
14 years 4 months ago
Auditing a Batch of SQL Queries
In this paper, we study the problem of auditing a batch of SQL queries: given a set of SQL queries that have been posed over a database, determine whether some subset of these quer...
Rajeev Motwani, Shubha U. Nabar, Dilys Thomas
TGC
2007
Springer
14 years 4 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
CRW
1998
Springer
332views Robotics» more  CRW 1998»
14 years 2 months ago
Communication in Domains with Unreliable, Single-Channel, Low-Bandwidth Communication
In most multiagent systems with communicating agents, the agents have the luxury of using reliable, multi-step negotiation protocols. They can do so primarily when communication i...
Peter Stone, Manuela M. Veloso
CCS
1994
ACM
14 years 2 months ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman