Sciweavers

1073 search results - page 121 / 215
» Secure context-sensitive authorization
Sort
View
144
Voted
EUROSEC
2010
ACM
15 years 8 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
129
Voted
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
15 years 7 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon
148
Voted
ACSAC
2002
IEEE
15 years 7 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
124
Voted
CSFW
2002
IEEE
15 years 7 months ago
A Privacy Policy Model for Enterprises
Privacy is an increasing concern in the marketplace. Although enterprises promise sound privacy practices to their customers, there is no technical mechanism to enforce them inter...
Günter Karjoth, Matthias Schunter
100
Voted
ACSAC
2000
IEEE
15 years 7 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini