Sciweavers

192 search results - page 4 / 39
» The Architecture of a Privacy-Aware Access Control Decision ...
Sort
View
SDMW
2009
Springer
14 years 3 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
WSC
2004
13 years 10 months ago
Hierarchical Production Planning Using a Hybrid System Dynamic - Discrete Event Simulation Architecture
Hierarchical production planning provides a formal bridge between long-term plans and short-term schedules. A hybrid simulation-based production planning architecture consisting o...
Jayendran Venkateswaran, Young-Jun Son, Albert Jon...
AINA
2004
IEEE
14 years 9 days ago
An Access Control Model Based on Distributed Knowledge Management
The conceptual architecture of the access control system described here is based on automatic distributed acquisition and processing of knowledge about users and devices in comput...
Alexandr Seleznyov, Stephen Hailes
SEC
2007
13 years 10 months ago
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
Location-Based Access Control (LBAC) systems support the evaluation of conditions on locations in the enforcement of access control policies. The ability to evaluate conditions on ...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
CN
2006
124views more  CN 2006»
13 years 8 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini