Sciweavers

282 search results - page 38 / 57
» Private Policy Negotiation
Sort
View
ISW
2009
Springer
14 years 3 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
PVLDB
2008
132views more  PVLDB 2008»
13 years 8 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne
SAC
2010
ACM
14 years 3 months ago
CNL4DSA: a controlled natural language for data sharing agreements
A Data Sharing Agreement (DSA) is an agreement among contracting parties regulating how they share data. A DSA represents a flexible mean to assure privacy of data exchanged on t...
Ilaria Matteucci, Marinella Petrocchi, Marco Luca ...
ICNS
2006
IEEE
14 years 2 months ago
Service Level Agreement Management with Adaptive Coordination
Service Level Agreement Management in the telecommunications domain consists of a set of mechanisms for provisioning and monitoring services according to requirements given by eit...
Dominic A. P. Greenwood, Giosuè Vitaglione,...