57,186 Hits in 7.0 sec

Location-based access control systems for mobile users

Elisa Bertino, Michael S. Kirkpatrick
2011 Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS - SPRINGL '11  
Many organizations require that sensitive information only be accessed on the organization premises or in secure locations.  ...  Access to certain information is thus allowed to authorized users, provided that these users are in specific locations when accessing the information. The GEO-RBAC model addresses such requirement.  ...  Another critical issue is related to the definition and enforcement of a constraint language suitable for open spaces. • The integration of a proximity language with GEO-RBAC.  ... 
doi:10.1145/2071880.2071890 dblp:conf/gis/BertinoK11 fatcat:gfogzyg6vzcx7n2354lzvwtl34

Policy Brief 6: Bringing intelligence and social network analysis together to fight illegal wildlife trade

Jacopo Costa
2021 Basel Institute on Governance Policy Briefs  
This policy brief explains how intelligence practitioners within law enforcement authorities and researchers skilled in social network analysis (SNA) can and should cooperate better in the fight against  ...  The combined effect of research and intelligence can have positive effects on the fight against IWT, and these effects are larger than the simple sum of their components.  ...  It also opens up new opportunities for disseminating the collected information in targeted intelligence packages to relevant stakeholders, such as wildlife authorities, NGOs and law enforcement actors.  ... 
doi:10.12685/bigpb.6.1-5 fatcat:y36vo5n3wjh3xbhmkixkp3666a

On middleware for emerging health services

Jatinder Singh, Jean M Bacon
2014 Journal of Internet Services and Applications  
Healthcare technologies are increasingly used not only for administration, but also in specialist treatments and many forms of monitoring, including when a person is mobile.  ...  Increasingly, individuals are taking responsibility for monitoring their own conditions.  ...  Acknowledgements We acknowledge the support of the UK Technology Strategy Board and the Engineering and Physical Sciences Research Council for the PAL project, grant TP/AN072C, 2009-12.  ... 
doi:10.1186/1869-0238-5-6 fatcat:f2fftrmtjzcnphk5edwccnf2ae

Finding solid ground: law enforcement, key populations and their health and rights in South Africa

Andrew Scheibe, Simon Howell, Alexandra Müller, Munyaradzi Katumba, Bram Langen, Lillian Artz, Monique Marks
2016 Journal of the International AIDS Society  
The antagonistic positioning, "othering" and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons  ...  Discussion: We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services.  ...  Acknowledgements The authors' engagement with representatives from law enforcement agencies and organizations led by, or working with KPs through a variety of past, current and planned projects informed  ... 
doi:10.7448/ias.19.4.20872 pmid:27435710 pmcid:PMC4951529 fatcat:azkcyxbjbncxjkqji2zfrpgray

Adversarial Stacked Auto-Encoders for Fair Representation Learning [article]

Patrik Joslin Kenfack, Adil Mehmood Khan, Rasheed Hussain, S.M. Ahsan Kazmi,
2021 arXiv   pre-print
Our results show that stacking different auto-encoders and enforcing fairness at different latent spaces result in an improvement of fairness compared to other existing approaches.  ...  Different types of learning methods are employed to map data into the fair representational space.  ...  The adversarial loss is to enforce the representation to satisfy certain fairness constraint.  ... 
arXiv:2107.12826v1 fatcat:dpajjw43dfbrfgdtyaox2luzsq

Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM

Davy Preuveneers, Wouter Joosen
2014 European Workshop on Practical Aspects of Health Informatics  
As next generation health monitoring and Ambient Assisted Living applications are opening up towards a variety of stakeholders and platforms, enforcing secure and reliable access to patient data by authorized  ...  However, static access control policies do not offer the flexibility to deal with unanticipated emergency situations where access to patient information is essential.  ...  Innovations in the technological space − ranging from mobile applications and websites dedicated to patient self-healthcare, towards electronic exchange of patient records between care givers − have emerged  ... 
dblp:conf/pahi/PreuveneersJ14 fatcat:g74anio2zjb5tivlcscjhejk3a

Policy Space for a Capability-Centered Development Strategy for Latin America [chapter]

Luis Abugattas, Eva Paus
2008 The Political Economy of Hemispheric Integration  
An analysis of the constraints emerging from international commitments has to be broadened beyond the WTO agreements to incorporate the effects of the emergence of a multilayered structure of international  ...  might emerge in the market, on the only condition that such service has been authorized in the country of origin.  ... 
doi:10.1057/9780230612945_5 fatcat:bt6kzac6hrex5hpupcehgdf5fy

A methodological framework for benchmarking smart transport cities

Ashim Kumar Debnath, Hoong Chor Chin, Md. Mazharul Haque, Belinda Yuen
2014 Cities  
London also appeared to be the smartest in terms of emergency transport services.  ...  The proposed methodology was illustrated using a set of data collected from 26 cities across the world through web search and contacting relevant transport authorities and agencies.  ...  ACKNOWLEDGEMENT The authors gratefully acknowledge the AcRF Tier 1 (Ministry of Education, Singapore) funding support for this research (Grant Number R-264-000-251-112).  ... 
doi:10.1016/j.cities.2013.11.004 fatcat:ru7pdfjrbvdfjjphxev2a3nakm

Data provenance to audit compliance with privacy policy in the Internet of Things

Thomas Pasquier, Jatinder Singh, Julia Powles, David Eyers, Margo Seltzer, Jean Bacon
2017 Personal and Ubiquitous Computing  
Cambridge authors acknowledge the support of Microsoft through the Microsoft Cloud Computing Research Centre.  ...  To the authors knowledge, this is a challenge that remains to be addressed for the IoT.  ...  More generally, management domains or application contexts may structure the IoT in a desirable way through being subject to a domain/contextwide authority for policy definition and enforcement.  ... 
doi:10.1007/s00779-017-1067-4 fatcat:xtckfdkhtngbzn4old2po3y2oi

Attestation-based policy enforcement for remote access

Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn
2004 Proceedings of the 11th ACM conference on Computer and communications security - CCS '04  
Acknowledgments: The authors thank the anonymous reviewers and Elisa Bertino for their valuable comments.  ...  Client integrity is measured using a Trusted Platform Module (TPM), a new security technology that is becoming broadly available on client systems, and our system uses these measurements for access policy  ...  more effective enforcement.  ... 
doi:10.1145/1030083.1030125 dblp:conf/ccs/SailerJZD04 fatcat:ngstfeamqjaare5j22dd5agxae

Optimal parameters selection for SAGD and VAPEX processes

Rizwan A. Khan, Abeeb A. Awotunde
2016 Journal of Petroleum Exploration and Production Technology  
Also, we present an efficient method to constrain horizontal wells to preset minimum well spacing constraints.  ...  The results indicated that the method could successfully determine the optimal parameters while satisfying the spacing constraint imposed by the user.  ...  Acknowledgements The authors would like to acknowledge the support provided by King Abdulaziz City for Science and Technology (KACST) through the Science & Technology Unit at King Fahd University of Petroleum  ... 
doi:10.1007/s13202-016-0302-2 fatcat:6rpjkpmgybbt3k2625nl6yphri

Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment [chapter]

Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers, Austin Tate, Jeff Dalton
2004 Lecture Notes in Computer Science  
Finally, we outline plans for future work.  ...  In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment.  ...  We argue for applying existing technology and mapping of already developed planners input and output formats to the emerging Semantic Web Services Process Model standard (  ... 
doi:10.1007/978-3-540-30475-3_30 fatcat:sq4xld7ucvfpzknbpsi4eirx5i

Engineering a Policy-Based System for Federated Healthcare Databases

Rafae Bhatti, Arjmand Samuel, Mohamed Eltabakh, Haseeb Amjad, Arif Ghafoor
2007 IEEE Transactions on Knowledge and Data Engineering  
We have shown that our policy specification language is effective in terms of handling a variety of expressive constraints on CDA-encoded document contents.  ...  We also present an enforcement architecture for the federated healthcare framework proposed in this paper.  ...  Top-level X-Grammar for XRS. This includes definition of authorization credential. Fig. 3 .Fig. 4 . 34 Top-level syntax of SoD constraint definition.  ... 
doi:10.1109/tkde.2007.1050 fatcat:47r5pichlfct7bpshj53a54y7u

Security, privacy and trust in Internet of Things: The road ahead

S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini
2015 Computer Networks  
In [20] the authors argue that most of the KMS protocols are not suitable for IoT.  ...  Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in various application domains.  ...  For example, in [83] the authors propose a hierarchical trust model for IoT, able to effectively detect malicious organizations from the behavior of their neighboring nodes.  ... 
doi:10.1016/j.comnet.2014.11.008 fatcat:nk2nml75efgkrj2soewtdpgvv4

Privacy, security, liberty: Informing the design of EMIS

Monika Büscher, Lisa Wood, Sung-Yueh Perng
2013 International Conference on Information Systems for Crisis Response and Management  
The aim is to inform the design of emergency management information systems (EMIS) and architectures that support emergent interoperability and assembly of emergency management systems of systems.  ...  This paper explores issues of security, privacy and liberty arising in relation to ICT supported emergency management.  ...  ) and the Bridge project, especially Lucas Introna, Peter Wahlgren, Matts Ahlsen, Kees Nieuwenhuis, Bernard Van Veelen, and Leonardo Ramirez for discussions of privacy and ethical issues.  ... 
dblp:conf/iscram/BuscherWP13 fatcat:ctnuyapp35gxbku4mhhhdxxtga
« Previous Showing results 1 — 15 out of 57,186 results