Sciweavers

726 search results - page 63 / 146
» Securing XML data in third-party distribution systems
Sort
View
SACMAT
2004
ACM
14 years 1 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
JAMIA
2011
68views more  JAMIA 2011»
12 years 10 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
ICOIN
2003
Springer
14 years 1 months ago
A Network Management Architecture Using XML-Based Policy Information Base
XML is being used to describe components and applications in a vendor and language neutral. Therefore it already has a role in distributed system. XML is also being used as a data ...
Kwoun Sup Youn, Choong Seon Hong
CAD
2000
Springer
13 years 7 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat