Sciweavers

318 search results - page 24 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 1 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
COMPSAC
2002
IEEE
14 years 17 days ago
Resource Instantiation Policies for Software Process Environments
Process-Centered Software Engineering Environments (PSEEs) deal with activities that demand limited resources. Characteristics about required resources and their dynamic availabili...
Carla Alessandra Lima Reis, Rodrigo Quites Reis, H...
SWS
2004
ACM
14 years 1 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
CCS
2008
ACM
13 years 9 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...