Sciweavers

581 search results - page 23 / 117
» policy 2009
Sort
View
LAWEB
2009
IEEE
14 years 4 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
ACMSE
2009
ACM
14 years 1 months ago
Towards policy driven self-configuration of user-centric communication
The convergence of various multimedia communications that includes voice, video and data presents many opportunities for enabling unified communication but paradoxically leads to ...
Paola Boettner, Mansi Gupta, Yali Wu, Andrew A. Al...
CSE
2009
IEEE
14 years 4 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
SOUPS
2009
ACM
14 years 4 months ago
Analyzing use of privacy policy attributes in a location sharing application
Privacy in location sharing applications is particularly important due to the sensitivity of users’ geographical location. Privacy in most location sharing applications is provi...
Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cr...
SIGCOMM
2009
ACM
14 years 4 months ago
Economic issues in shared infrastructures
We define some interesting incentive issues that arise in the management of virtual infrastructures. We demonstrate that participants’ decisions about the quantities of infrast...
Costas Courcoubetis, Richard R. Weber