Sciweavers

227 search results - page 13 / 46
» Purpose based access control for privacy protection in relat...
Sort
View
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
13 years 12 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 8 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
ADC
2005
Springer
111views Database» more  ADC 2005»
14 years 1 months ago
An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories
This paper describes an access control method of the XML repository system, SAXOPHONE, which was implemented at Tokyo Metropolitan University. The main feature of our research is ...
Shohei Yokoyama, Manabu Ohta, Kaoru Katayama, Hiro...
ESORICS
2005
Springer
14 years 1 months ago
On Obligations
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
DRM
2009
Springer
14 years 2 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacri...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...