Sciweavers

EMISAIJ
2010
13 years 6 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
RTAS
2010
IEEE
13 years 9 months ago
Physicalnet: A Generic Framework for Managing and Programming Across Pervasive Computing Networks
This paper describes the design and implementation of a pervasive computing framework, named Physicalnet. Essentially, Physicalnet is a generic paradigm for managing and programmi...
Pascal Vicaire, Zhiheng Xie, Enamul Hoque, John A....
TSE
2008
128views more  TSE 2008»
13 years 11 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
EOR
2006
82views more  EOR 2006»
13 years 11 months ago
Flowshop scheduling research after five decades
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...
Jatinder N. D. Gupta, Edward F. Stafford
IADIS
2004
14 years 25 days ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl
ARCS
2008
Springer
14 years 1 months ago
Self-aware Memory: Managing Distributed Memory in an Autonomous Multi-master Environment
Abstract. A major problem considering parallel computing is maintaining memory consistency and coherency, and ensuring ownership and access rights. These problems mainly arise from...
Rainer Buchty, Oliver Mattes, Wolfgang Karl
USS
2008
14 years 1 months ago
Access Control for Federation of Emulab-based Network Testbeds
This paper describes a resource access control system for federation of Emulab-based testbeds within the DETER federation architecture. The system is based on three levels of prin...
Ted Faber, John Wroclawski
INAP
2001
Springer
14 years 3 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
SRDS
2006
IEEE
14 years 5 months ago
Cryptree: A Folder Tree Structure for Cryptographic File Systems
We present Cryptree, a cryptographic tree structure which facilitates access control in file systems operating on untrusted storage. Cryptree leverages the file system’s folde...
Dominik Grolimund, Luzius Meisser, Stefan Schmid, ...
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
14 years 5 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich