Sciweavers

318 search results - page 26 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
ACSAC
2000
IEEE
14 years 1 days ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 3 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
EGOV
2005
Springer
14 years 1 months ago
An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone
In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens....
Franco Arcieri, Andrea Dimitri, Fabio Fioravanti, ...
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
TELECARE
2004
132views Healthcare» more  TELECARE 2004»
13 years 9 months ago
Federated management of information for TeleCARE
Distributed information management plays a fundamental role within the base infrastructure supporting the elderly care domain. Specificities of this domain include the autonomy and...
Hamideh Afsarmanesh, Víctor Guevara-Mas&iac...