Sciweavers

374 search results - page 24 / 75
» Rights Protection for Relational Data
Sort
View
HICSS
2006
IEEE
137views Biometrics» more  HICSS 2006»
14 years 2 months ago
Identity Management and Data Sharing in the European Union
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessit...
Benoît Otjacques, Patrik Hitzelberger, Ferna...
DRMTICS
2005
Springer
14 years 2 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
SAC
2009
ACM
14 years 3 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
INFSOF
2006
81views more  INFSOF 2006»
13 years 8 months ago
A framework for anonymous but accountable self-organizing communities
In this paper we propose a novel architecture and approach to provide accountability for Web communities that require a high-level of privacy. A two-layered privacy protection arc...
Gábor Ziegler, Csilla Farkas, András...
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
14 years 3 months ago
On the Development of an Internetwork-Centric Defense for Scanning Worms
Studies of worm outbreaks have found that the speed of worm propagation makes manual intervention ineffective. Consequently, many automated containment mechanisms have been propos...
Scott E. Coull, Boleslaw K. Szymanski