Sciweavers

807 search results - page 77 / 162
» Term Rewriting for Access Control
Sort
View
128
Voted
JCDL
2009
ACM
133views Education» more  JCDL 2009»
15 years 10 months ago
EnTag: enhancing social tagging for discovery
The EnTag (Enhanced Tagging for Discovery) project investigated the effect on indexing and retrieval when using only social tagging versus when using social tagging in combination...
Koraljka Golub, Jim Moon, Douglas Tudhope, Catheri...
155
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
95
Voted
WPES
2005
ACM
15 years 9 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
CCS
2004
ACM
15 years 9 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
131
Voted
SAC
2008
ACM
15 years 3 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...