Sciweavers

705 search results - page 5 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
ISW
1997
Springer
14 years 3 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
CSFW
2005
IEEE
14 years 4 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers
COORDINATION
2004
Springer
14 years 4 months ago
Enforcement of Communal Policies for P2P Systems
Abstract. We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an...
Mihail F. Ionescu, Naftaly H. Minsky, Thu D. Nguye...
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 3 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
OOIS
1997
Springer
14 years 2 months ago
An Agent-Based Coordination Model on Workflow Databases
Workflow management, one of the important technologies for supporting collaborative work, requires database technologies like distributed data management or transaction management...
Takeo Kunishima, Kazumasa Yokota