Sciweavers

2422 search results - page 104 / 485
» Security Policy Consistency
Sort
View
149
Voted
PET
2004
Springer
15 years 10 months ago
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
Abstract. Although the number of online privacy policies is increasing, it remains difficult for Internet users to understand them, let alone to compare policies across sites or i...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
ACISP
2003
Springer
15 years 8 months ago
Grouping Verifiable Content for Selective Disclosure
Abstract. This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more ...
Laurence Bull, David McG. Squire, Jan Newmarch, Yu...
DISCEX
2003
IEEE
15 years 10 months ago
A Role-based Trust-management Framework
The RT Role-based Trust-management framework provides policy language, semantics, deduction engine, and pragmatic features such as application domain specification documents that...
Ninghui Li, John C. Mitchell
POLICY
2007
Springer
15 years 10 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...
220
Voted
IHI
2012
217views Healthcare» more  IHI 2012»
14 years 4 days ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...