A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Policies in Distributed CSCW and Workflow Systems
2010
IEEE transactions on systems, man and cybernetics. Part A. Systems and humans
Research challenges of role based access control models for security policies in distributed CSCW and workflow systems are presented. ...
In this paper, we have surveyed Computer-Supported Cooperative Work (CSCW) and workflow systems based on a time-line and have categorized the systems based on their emphasis on user or process interactions ...
Active database research has addressed trigger based authorization changes and used the notion of condition based access control [65] . ...
doi:10.1109/tsmca.2010.2046727
fatcat:ysjm5nn5hjeehpfa7k3xbmja64
SwinDeW-C: A Peer-to-Peer Based Cloud Workflow System
[chapter]
2010
Handbook of Cloud Computing
Therefore, the investigation of workflow systems based on cloud computing, i.e. cloud workflow systems, is a timely issue and worthwhile for increasing efforts. ...
Based on the above analysis, it is evident that cloud computing is a promising solution to address the requirement of scalable resource, and structured decentral- ...
Acknowledgement This work is partially supported by Australian Research Council under Linkage Project LP0990393. ...
doi:10.1007/978-1-4419-6524-0_13
fatcat:y6zhcdh3b5f6hj6yjfgctmjhza
Trusted PKI based Conflicts Resolution for Multi-domain Access Control
2017
DEStech Transactions on Computer Science and Engineering
This paper proposes a method of conflict resolution based on trusted PKI authorization. ...
cross-domain resource access when eliminating the conflict of access control policies. ...
Acknowledgement This research was financially supported by National High Technology Research and Development Application of China (2012AA012902) and "HGJ" National Major Technological Projects (2013ZX01045 ...
doi:10.12783/dtcse/cst2017/12533
fatcat:f3csnui6wzcatbuzn6pavm5hya
CINECA: Report on trust model for partner sites, and between sites and controlled-access researchers
2020
Zenodo
In this deliverable document, we report on the activities for Deliverable 4.1 - Report on trust model for partner sites, and between sites and controlled-access researchers. ...
federated analysis workflows and describing existing data access models to inspire subsequent WP4 deliverables related to the implementation of the federated analysis workflow. ...
Executive Summary In this deliverable document, we report on the activities for Deliverable 4.1 -Report on trust model for partner sites, and between sites and controlled-access researchers. ...
doi:10.5281/zenodo.3909521
fatcat:gkaftnoitvcqjigxagkwfkrcgu
Study on Grade Division Policy for Trusted Network
2012
Procedia Environmental Sciences
Improved workflow for access to trusted network terminal was provided. ...
Scholars around the world have carried out extensive research word on architecture, protocols, algorithms and application for trusted network at present, and proposed a variety of network credible verification ...
Improved workflow for access to trusted network terminal was provided. ...
doi:10.1016/j.proenv.2012.01.436
fatcat:g5fv7nq33bb6hklq5sg372hnxm
Secure knowledge management: confidentiality, trust, and privacy
2006
IEEE transactions on systems, man and cybernetics. Part A. Systems and humans
Index Terms-Data mining, privacy, role-based access control (RBAC), secure knowledge management, security policy, semantic web, trust negotiation (TN), usage control (UCON). ...
In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored. ...
Previously, he has published influential and widely cited papers on various security topics including safety and expressive power of access-control models, lattice-based access controls, and multilevel ...
doi:10.1109/tsmca.2006.871796
fatcat:pnqtkbbuazaipeqlo3iz4isdri
Electronic support of government-to-government negotiation and collaboration for the design and implementation of new policies
2010
International Journal of Applied Systemic Studies
The development of TNC has been based on extensive analysis of the relevant requirements of public organisations from the USA and the European Union. ...
In this paper we present the internet/WWW-based information system TNC (Trust-Negotiation-Collaboration), which offers a wide range of functionalities supporting initial trust relationship building and ...
and disadvantages of these strategies and comments on them. ...
doi:10.1504/ijass.2010.034621
fatcat:pczgpqiq2re5nhckabvzeslwe4
Preserving and Annotating Publishers' Data
2020
Zenodo
support of the research community and iii) strategies for future-proof accessibility and long-term preservation. ...
conventional print and distribution, print-on-demand plus a digital edition for open reading access and use by the research community. ...
metadata
-uploading of publisher business administration documents
-access controls for selective reader copyright protection and work-in-
progress
11
16/10/2020
Findable, Accessible, Interoperable ...
doi:10.5281/zenodo.4106790
fatcat:p2yq3cvrjjefflnpjm4nme3ru4
On Distributed Collaboration for Biomedical Analyses
2019
2019 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)
Cooperation of research groups is nowadays common for the development and execution of biomedical analyses. ...
We present a set of distributed architectures for such analyses that we have derived from discussions with different medical research groups and a study of related work. ...
on the requirements of the collaboration between research groups and available infrastructure (hospitals, clusters etc.) 2) Define strategies for scalability and reproducibility based on the elements ...
doi:10.1109/ccgrid.2019.00079
dblp:conf/ccgrid/BoujdadGSANR19
fatcat:afij4ahqyngfxnevrhrn5uqruq
Data Protection by Design: Building the foundations of trustworthy data sharing
2019
Zenodo
a process-based mechanism, i.e. a workflow, that should have a trustworthiness-by-design approach at its core. ...
Although the form and purposes of data trusts are currently a topic of much academic discussion, a broadly accepted definition has not yet emerged. ...
Acknowledgements Data Pitch is funded by the European Union's Horizon 2020 Research and Innovation Programme under the Grant Agreement 732506. ...
doi:10.5281/zenodo.2789412
fatcat:5eaxsjja2zfyhojk5toe3vx4de
Trustworthy Semantic Web Technologies for Secure Knowledge Management
2008
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
In this paper we explore the applications of trustworthy semantic web technologies for secure knowledge management. ...
This means one needs to enforce some form of access control such as role-based access control, credential mechanism and encryption. ...
That is, access must be controlled to various portions of the document for reading, browsing and modifications. There is research on securing XML and XML schemas. The next step is securing RDF. ...
doi:10.1109/euc.2008.174
dblp:conf/euc/ThuraisinghamP08
fatcat:hesyz4ralfdxnajyxseigwfeqa
AuthPrivacyChain: A Blockchain-based Access Control Framework with Privacy Protection in Cloud
2020
IEEE Access
Access control is one of the critical security technologies for protecting sensitive data stored in the cloud by enterprises and individuals. ...
To address this issue, we propose a blockchain-based access control framework with privacy protection called AuthPrivacyChain. ...
Second, in encryption-based access control, ABE-based access control requires one or more trusted centers to manage and distribute the keys. ...
doi:10.1109/access.2020.2985762
fatcat:vxwhbnmalzhg5cchc553gznmmm
Access control in collaborative commerce
2007
Decision Support Systems
There are many emerging issues in collaborative commerce and one of them is access control. ...
In this paper, the format of corporate collaboration is considered, and the conflicts between the access control policies of interfaces are addressed. ...
The two main streams of access control for workflow applications are rolebased access control (RBAC) and predicate-based access control [15] . ...
doi:10.1016/j.dss.2005.05.022
fatcat:fp7b4ehcsbbf5mia7zyzmqduim
A Strategy for an MLS Workflow Management System
[chapter]
2000
IFIP Advances in Information and Communication Technology
In this paper, we present requirements for MLS workflow and a strategy for implementing it, especially the method for decomposing an MLS workflow into multiple single-level workflows. ...
An MLS WFMS that allows users to program multilevel mission logic, securely coordinate widely distributed tasks, and monitor the progress of the workflow across classification domains is required. ...
Based on this workflow design, a specification for workflow runtime can be generated. ...
doi:10.1007/978-0-387-35508-5_11
fatcat:mo5amjmh4vglfd2fgcbs77h4ue
A Framework for Distributed Preservation Workflows
2010
International Journal of Digital Curation
The Planets integrated environment provides a number of end-user applications that allow data curators to execute and scientifically evaluate preservation experiments based on composable preservation services ...
In this paper, we focus on the middleware and programming model and show how it can be utilised in order to create complex preservation workflows. ...
Acknowledgments Work presented in this paper is partially supported by European Community under the Information Society Technologies (IST) Programme of the 6th FP for RTD -Project IST-033789. ...
doi:10.2218/ijdc.v5i1.154
fatcat:wiindi3byvedne4dhcc57nw35y
« Previous
Showing results 1 — 15 out of 23,436 results