Sciweavers

282 search results - page 22 / 57
» Private Policy Negotiation
Sort
View
CCS
2004
ACM
14 years 24 days ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
ECAI
2006
Springer
13 years 11 months ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer
ISI
2006
Springer
13 years 7 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
SEMWEB
2004
Springer
14 years 22 days ago
Trust Negotiation for Semantic Web Services
Semantic Web Services enable the dynamic discovery of services based on a formal, explicit specification of the requester needs. The actual Web Services that will be used to satis...
Daniel Olmedilla, Rubén Lara, Axel Polleres...
JIS
2007
74views more  JIS 2007»
13 years 7 months ago
Fifty years of scientific and technical information policy in France (1955 - 2005)
Over the last fifty years, French public authorities have played a major role in developing a policy for scientific and technical information (STI) in France. Four distinct period...
Serge Cacaly, Yves-François Le Coadic