Results 1 - 10
of
597
Protection and the control of information sharing in Multics
- Communications of the ACM
, 1974
"... This document was originally prepared off-line. This file is the result of scan, OCR, and manual touchup, starting ..."
Abstract
-
Cited by 124 (2 self)
- Add to MetaCart
This document was originally prepared off-line. This file is the result of scan, OCR, and manual touchup, starting
Protecting privacy using the decentralized label model
- ACM Transactions on Software Engineering and Methodology
, 2000
"... Stronger protection is needed for the confidentiality and integrity of data, because programs containing untrusted code are the rule rather than the exception. Information flow control allows the enforcement of end-to-end security policies, but has been difficult to put into practice. This article d ..."
Abstract
-
Cited by 288 (27 self)
- Add to MetaCart
Stronger protection is needed for the confidentiality and integrity of data, because programs containing untrusted code are the rule rather than the exception. Information flow control allows the enforcement of end-to-end security policies, but has been difficult to put into practice. This article
Automated trust negotiation
- In DARPA Information Survivability Conference and Exposition, volume I
, 2000
"... Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as poten ..."
Abstract
-
Cited by 241 (18 self)
- Add to MetaCart
Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials
Access Control for Collaborative Environments
"... Access control is an indispensable part of any information sharing system. Collaborative environments introduce new requirements for access control, which cannot be met by using existing models developed for non-collaborative domains. We have developed a new access control model for meeting these re ..."
Abstract
-
Cited by 165 (6 self)
- Add to MetaCart
Access control is an indispensable part of any information sharing system. Collaborative environments introduce new requirements for access control, which cannot be met by using existing models developed for non-collaborative domains. We have developed a new access control model for meeting
Information Costs And Home Bias: An Analysis Of U.s. Holdings Of Foreign . . .
- Journal of International Economics
, 2000
"... : We aim to provide insight into the observed equity home bias phenomenon by analyzing the determinants of U.S. holdings of equities across a wide range of countries. In particular, we explore the role of information costs in determining the country distribution of U.S. investors' equity holdin ..."
Abstract
-
Cited by 171 (22 self)
- Add to MetaCart
holdings using a comprehensive new data set on U.S. ownership of foreign stocks. We find that U.S. holdings of a country's equities are positively related to the share of that country's stock market that is listed on U.S. exchanges, even after controlling for capital controls, trade links
Maximizing Sharing of Protected Information 1
"... Despite advances in recent years in the area of mandatory access control in database systems, today’s information repositories remain vulnerable to inference and data association attacks that can result in serious information leakage. Without support for coping against these attacks, sensitive infor ..."
Abstract
- Add to MetaCart
Despite advances in recent years in the area of mandatory access control in database systems, today’s information repositories remain vulnerable to inference and data association attacks that can result in serious information leakage. Without support for coping against these attacks, sensitive
Controlled Sharing of Personal Information in Android
"... Smartphones with third-party applications have become very popular. Recently, they have received attention for transferring personal information without the users ’ knowledge. The objective of this work is to help users to protect their privacy by increasing their consciousness on how personal infor ..."
Abstract
- Add to MetaCart
information is collected and distributed. We propose a design that provides a higher degree of control by allowing users to set preferences that determine what personal information to share. We implement selected parts from our design, in order to evaluate whether this solution serves as a utility or not. 1
User experiences with sharing and access control
- In CHI ’06: CHI ’06 extended abstracts on Human factors in computing systems
, 2006
"... The sharing of network-based information is a key component of recreational and professional interaction, from email attachments to P2P networks. However, people need to accommodate technical challenges in successful and secure content sharing. In particular, people have to manage access control pol ..."
Abstract
-
Cited by 34 (5 self)
- Add to MetaCart
The sharing of network-based information is a key component of recreational and professional interaction, from email attachments to P2P networks. However, people need to accommodate technical challenges in successful and secure content sharing. In particular, people have to manage access control
Policy-based Information Sharing in
"... Abstract—Healthcare is a highly collaborative environment, where the active sharing of information is central to the care process. Due to the sensitive nature of medical information, care providers are responsible for protecting data, controlling the circumstances in which it is released to others. ..."
Abstract
- Add to MetaCart
Abstract—Healthcare is a highly collaborative environment, where the active sharing of information is central to the care process. Due to the sensitive nature of medical information, care providers are responsible for protecting data, controlling the circumstances in which it is released to others
Data protection and data sharing in telematics
- Mobile Networks and Applications
, 2004
"... Abstract. Automotive telematics may be defined as the information-intensive applications enabled for vehicles by a combination of telecommunications and computing technology. Telematics by its nature requires the capture, storage, and exchange of sensor data to obtain remote services. Such data like ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
stakeholders control over data sharing and use. In this paper, we identify several data protection challenges specifically related to the automotive telematics domain, and propose a general data protection framework to address some of those challenges. The framework enables data aggregation before data
Results 1 - 10
of
597