• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 597
Next 10 →

Protection and the control of information sharing in Multics

by Jerome H. Saltzer - Communications of the ACM , 1974
"... This document was originally prepared off-line. This file is the result of scan, OCR, and manual touchup, starting ..."
Abstract - Cited by 124 (2 self) - Add to MetaCart
This document was originally prepared off-line. This file is the result of scan, OCR, and manual touchup, starting

Protecting privacy using the decentralized label model

by Andrew C. Myers, Barbara Liskov - ACM Transactions on Software Engineering and Methodology , 2000
"... Stronger protection is needed for the confidentiality and integrity of data, because programs containing untrusted code are the rule rather than the exception. Information flow control allows the enforcement of end-to-end security policies, but has been difficult to put into practice. This article d ..."
Abstract - Cited by 288 (27 self) - Add to MetaCart
Stronger protection is needed for the confidentiality and integrity of data, because programs containing untrusted code are the rule rather than the exception. Information flow control allows the enforcement of end-to-end security policies, but has been difficult to put into practice. This article

Automated trust negotiation

by William H. Winsborough, Ninghui Li - In DARPA Information Survivability Conference and Exposition, volume I , 2000
"... Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as poten ..."
Abstract - Cited by 241 (18 self) - Add to MetaCart
Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials

Access Control for Collaborative Environments

by Honghai Shen, Prasun Dewan
"... Access control is an indispensable part of any information sharing system. Collaborative environments introduce new requirements for access control, which cannot be met by using existing models developed for non-collaborative domains. We have developed a new access control model for meeting these re ..."
Abstract - Cited by 165 (6 self) - Add to MetaCart
Access control is an indispensable part of any information sharing system. Collaborative environments introduce new requirements for access control, which cannot be met by using existing models developed for non-collaborative domains. We have developed a new access control model for meeting

Information Costs And Home Bias: An Analysis Of U.s. Holdings Of Foreign . . .

by Alan G. Ahearne, Alan G. Ahearne, William L. Griever, William L. Griever, Francis E. Warnock, Francis E. Warnock - Journal of International Economics , 2000
"... : We aim to provide insight into the observed equity home bias phenomenon by analyzing the determinants of U.S. holdings of equities across a wide range of countries. In particular, we explore the role of information costs in determining the country distribution of U.S. investors' equity holdin ..."
Abstract - Cited by 171 (22 self) - Add to MetaCart
holdings using a comprehensive new data set on U.S. ownership of foreign stocks. We find that U.S. holdings of a country's equities are positively related to the share of that country's stock market that is listed on U.S. exchanges, even after controlling for capital controls, trade links

Maximizing Sharing of Protected Information 1

by Steven Dawson, Sabrina De, Capitani Vimercati, Patrick Lincoln, Pierangela Samarati
"... Despite advances in recent years in the area of mandatory access control in database systems, today’s information repositories remain vulnerable to inference and data association attacks that can result in serious information leakage. Without support for coping against these attacks, sensitive infor ..."
Abstract - Add to MetaCart
Despite advances in recent years in the area of mandatory access control in database systems, today’s information repositories remain vulnerable to inference and data association attacks that can result in serious information leakage. Without support for coping against these attacks, sensitive

Controlled Sharing of Personal Information in Android

by Stian Pedersen, Asmund Nyre, Karin Bernsmed
"... Smartphones with third-party applications have become very popular. Recently, they have received attention for transferring personal information without the users ’ knowledge. The objective of this work is to help users to protect their privacy by increasing their consciousness on how personal infor ..."
Abstract - Add to MetaCart
information is collected and distributed. We propose a design that provides a higher degree of control by allowing users to set preferences that determine what personal information to share. We implement selected parts from our design, in order to evaluate whether this solution serves as a utility or not. 1

User experiences with sharing and access control

by Tara Whalen, Diana Smetters, Elizabeth F. Churchill - In CHI ’06: CHI ’06 extended abstracts on Human factors in computing systems , 2006
"... The sharing of network-based information is a key component of recreational and professional interaction, from email attachments to P2P networks. However, people need to accommodate technical challenges in successful and secure content sharing. In particular, people have to manage access control pol ..."
Abstract - Cited by 34 (5 self) - Add to MetaCart
The sharing of network-based information is a key component of recreational and professional interaction, from email attachments to P2P networks. However, people need to accommodate technical challenges in successful and secure content sharing. In particular, people have to manage access control

Policy-based Information Sharing in

by Jatinder Singh, Luis Vargas, Jean Bacon, Ken Moody
"... Abstract—Healthcare is a highly collaborative environment, where the active sharing of information is central to the care process. Due to the sensitive nature of medical information, care providers are responsible for protecting data, controlling the circumstances in which it is released to others. ..."
Abstract - Add to MetaCart
Abstract—Healthcare is a highly collaborative environment, where the active sharing of information is central to the care process. Due to the sensitive nature of medical information, care providers are responsible for protecting data, controlling the circumstances in which it is released to others

Data protection and data sharing in telematics

by Sastry Duri, Jeffrey Elliot, Marco Gruteser, Xuan Liu, Ronald Perez, Moninder Singh, Jung-mu Tang - Mobile Networks and Applications , 2004
"... Abstract. Automotive telematics may be defined as the information-intensive applications enabled for vehicles by a combination of telecommunications and computing technology. Telematics by its nature requires the capture, storage, and exchange of sensor data to obtain remote services. Such data like ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
stakeholders control over data sharing and use. In this paper, we identify several data protection challenges specifically related to the automotive telematics domain, and propose a general data protection framework to address some of those challenges. The framework enables data aggregation before data
Next 10 →
Results 1 - 10 of 597
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University