Sciweavers

MMMACNS
2010
Springer
13 years 11 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
CCS
2010
ACM
13 years 11 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CN
2007
111views more  CN 2007»
14 years 13 days ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
DBSEC
2010
113views Database» more  DBSEC 2010»
14 years 19 days ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
DBSEC
2006
122views Database» more  DBSEC 2006»
14 years 1 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
ESWS
2008
Springer
14 years 2 months ago
Entity Lifecycle Management for OKKAM
In this paper, we examine the special requirements of lifecycle management for entities in the context of an entity management system for the semantic web. We study the requirement...
Junaid Ahsenali Chaudhry, Themis Palpanas, Perikli...
WISE
2002
Springer
14 years 5 months ago
Towards Translating Authorizations for Transformed XML Documents
Web based services and applications have increased the availability and accessibility of information. XML has recently emerged as an important standard in the area of information ...
Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko K...
XMLSEC
2003
ACM
14 years 5 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
CCS
2004
ACM
14 years 5 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
SACMAT
2006
ACM
14 years 6 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas