Sciweavers

1627 search results - page 187 / 326
» On context in authorization policy
Sort
View
HPDC
2005
IEEE
14 years 3 months ago
CODO: firewall traversal by cooperative on-demand opening
Firewalls and network address translators (NATs) cause significant connectivity problems along with benefits such as network protection and easy address planning. Connectivity pro...
Se-Chang Son, Bill Allcock, Miron Livny
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
EUROSEC
2010
ACM
14 years 3 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
DEXAW
2003
IEEE
137views Database» more  DEXAW 2003»
14 years 3 months ago
Applying the Semantic Web Layers to Access Control
The Semantic Web, also known as the Web of meaning, is considered the new generation of the Web. Its objective is to enable computers and people to work in cooperation. A requisit...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
WETICE
2003
IEEE
14 years 3 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deï¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...