23,436 Hits in 5.6 sec

Security Policies in Distributed CSCW and Workflow Systems

Tanvir Ahmed, Anand R. Tripathi
2010 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Research challenges of role based access control models for security policies in distributed CSCW and workflow systems are presented.  ...  In this paper, we have surveyed Computer-Supported Cooperative Work (CSCW) and workflow systems based on a time-line and have categorized the systems based on their emphasis on user or process interactions  ...  Active database research has addressed trigger based authorization changes and used the notion of condition based access control [65] .  ... 
doi:10.1109/tsmca.2010.2046727 fatcat:ysjm5nn5hjeehpfa7k3xbmja64

SwinDeW-C: A Peer-to-Peer Based Cloud Workflow System [chapter]

Xiao Liu, Dong Yuan, Gaofeng Zhang, Jinjun Chen, Yun Yang
2010 Handbook of Cloud Computing  
Therefore, the investigation of workflow systems based on cloud computing, i.e. cloud workflow systems, is a timely issue and worthwhile for increasing efforts.  ...  Based on the above analysis, it is evident that cloud computing is a promising solution to address the requirement of scalable resource, and structured decentral-  ...  Acknowledgement This work is partially supported by Australian Research Council under Linkage Project LP0990393.  ... 
doi:10.1007/978-1-4419-6524-0_13 fatcat:y6zhcdh3b5f6hj6yjfgctmjhza

Trusted PKI based Conflicts Resolution for Multi-domain Access Control

Da-peng XIONG, Liang CHEN, Peng WANG
2017 DEStech Transactions on Computer Science and Engineering  
This paper proposes a method of conflict resolution based on trusted PKI authorization.  ...  cross-domain resource access when eliminating the conflict of access control policies.  ...  Acknowledgement This research was financially supported by National High Technology Research and Development Application of China (2012AA012902) and "HGJ" National Major Technological Projects (2013ZX01045  ... 
doi:10.12783/dtcse/cst2017/12533 fatcat:f3csnui6wzcatbuzn6pavm5hya

CINECA: Report on trust model for partner sites, and between sites and controlled-access researchers

Elisa Cirillo, Kaur Alasoo, Alex Michie, Thomas Binsl, Juha Törnroos, Shubham Kapoor, Kirill Tsukanov, William Rayner, Mamana Mbiyavanga, Shaikh Rashid, Harm-Jan Westra
2020 Zenodo  
In this deliverable document, we report on the activities for Deliverable 4.1 - Report on trust model for partner sites, and between sites and controlled-access researchers.  ...  federated analysis workflows and describing existing data access models to inspire subsequent WP4 deliverables related to the implementation of the federated analysis workflow.  ...  Executive Summary In this deliverable document, we report on the activities for Deliverable 4.1 -Report on trust model for partner sites, and between sites and controlled-access researchers.  ... 
doi:10.5281/zenodo.3909521 fatcat:gkaftnoitvcqjigxagkwfkrcgu

Study on Grade Division Policy for Trusted Network

Dongyun Long
2012 Procedia Environmental Sciences  
Improved workflow for access to trusted network terminal was provided.  ...  Scholars around the world have carried out extensive research word on architecture, protocols, algorithms and application for trusted network at present, and proposed a variety of network credible verification  ...  Improved workflow for access to trusted network terminal was provided.  ... 
doi:10.1016/j.proenv.2012.01.436 fatcat:g5fv7nq33bb6hklq5sg372hnxm

Secure knowledge management: confidentiality, trust, and privacy

E. Bertino, L.R. Khan, R. Sandhu, B. Thuraisingham
2006 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Index Terms-Data mining, privacy, role-based access control (RBAC), secure knowledge management, security policy, semantic web, trust negotiation (TN), usage control (UCON).  ...  In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored.  ...  Previously, he has published influential and widely cited papers on various security topics including safety and expressive power of access-control models, lattice-based access controls, and multilevel  ... 
doi:10.1109/tsmca.2006.871796 fatcat:pnqtkbbuazaipeqlo3iz4isdri

Electronic support of government-to-government negotiation and collaboration for the design and implementation of new policies

Fillia Makedon, Euripidis Loukis, James Ford
2010 International Journal of Applied Systemic Studies  
The development of TNC has been based on extensive analysis of the relevant requirements of public organisations from the USA and the European Union.  ...  In this paper we present the internet/WWW-based information system TNC (Trust-Negotiation-Collaboration), which offers a wide range of functionalities supporting initial trust relationship building and  ...  and disadvantages of these strategies and comments on them.  ... 
doi:10.1504/ijass.2010.034621 fatcat:pczgpqiq2re5nhckabvzeslwe4

Preserving and Annotating Publishers' Data

Peter John Cornwell, Jose Benito Gonzalez Lopez, Tom Lamberty Graf Hendrikoff
2020 Zenodo  
support of the research community and iii) strategies for future-proof accessibility and long-term preservation.  ...  conventional print and distribution, print-on-demand plus a digital edition for open reading access and use by the research community.  ...  metadata -uploading of publisher business administration documents -access controls for selective reader copyright protection and work-in- progress 11 16/10/2020 Findable, Accessible, Interoperable  ... 
doi:10.5281/zenodo.4106790 fatcat:p2yq3cvrjjefflnpjm4nme3ru4

On Distributed Collaboration for Biomedical Analyses

Fatima-Zahra Boujdad, Alban Gaignard, Mario Sudholt, Wilmer Garzon-Alfonso, Luis Daniel Benavides Navarro, Richard Redon
2019 2019 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)  
Cooperation of research groups is nowadays common for the development and execution of biomedical analyses.  ...  We present a set of distributed architectures for such analyses that we have derived from discussions with different medical research groups and a study of related work.  ...  on the requirements of the collaboration between research groups and available infrastructure (hospitals, clusters etc.) 2) Define strategies for scalability and reproducibility based on the elements  ... 
doi:10.1109/ccgrid.2019.00079 dblp:conf/ccgrid/BoujdadGSANR19 fatcat:afij4ahqyngfxnevrhrn5uqruq

Data Protection by Design: Building the foundations of trustworthy data sharing

Sophie Stalla-Bourdillon, Gefion Thuermer, Johanna C. Walker, Carmichael. Laura
2019 Zenodo  
a process-based mechanism, i.e. a workflow, that should have a trustworthiness-by-design approach at its core.  ...  Although the form and purposes of data trusts are currently a topic of much academic discussion, a broadly accepted definition has not yet emerged.  ...  Acknowledgements Data Pitch is funded by the European Union's Horizon 2020 Research and Innovation Programme under the Grant Agreement 732506.  ... 
doi:10.5281/zenodo.2789412 fatcat:5eaxsjja2zfyhojk5toe3vx4de

Trustworthy Semantic Web Technologies for Secure Knowledge Management

Bhavani Thuraisingham, Pranav Parikh
2008 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
In this paper we explore the applications of trustworthy semantic web technologies for secure knowledge management.  ...  This means one needs to enforce some form of access control such as role-based access control, credential mechanism and encryption.  ...  That is, access must be controlled to various portions of the document for reading, browsing and modifications. There is research on securing XML and XML schemas. The next step is securing RDF.  ... 
doi:10.1109/euc.2008.174 dblp:conf/euc/ThuraisinghamP08 fatcat:hesyz4ralfdxnajyxseigwfeqa

AuthPrivacyChain: A Blockchain-based Access Control Framework with Privacy Protection in Cloud

Caixia Yang, Liang Tan, Na Shi, Bolei Xu, Yang Cao, Keping Yu
2020 IEEE Access  
Access control is one of the critical security technologies for protecting sensitive data stored in the cloud by enterprises and individuals.  ...  To address this issue, we propose a blockchain-based access control framework with privacy protection called AuthPrivacyChain.  ...  Second, in encryption-based access control, ABE-based access control requires one or more trusted centers to manage and distribute the keys.  ... 
doi:10.1109/access.2020.2985762 fatcat:vxwhbnmalzhg5cchc553gznmmm

Access control in collaborative commerce

Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
2007 Decision Support Systems  
There are many emerging issues in collaborative commerce and one of them is access control.  ...  In this paper, the format of corporate collaboration is considered, and the conflicts between the access control policies of interfaces are addressed.  ...  The two main streams of access control for workflow applications are rolebased access control (RBAC) and predicate-based access control [15] .  ... 
doi:10.1016/j.dss.2005.05.022 fatcat:fp7b4ehcsbbf5mia7zyzmqduim

A Strategy for an MLS Workflow Management System [chapter]

Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz
2000 IFIP Advances in Information and Communication Technology  
In this paper, we present requirements for MLS workflow and a strategy for implementing it, especially the method for decomposing an MLS workflow into multiple single-level workflows.  ...  An MLS WFMS that allows users to program multilevel mission logic, securely coordinate widely distributed tasks, and monitor the progress of the workflow across classification domains is required.  ...  Based on this workflow design, a specification for workflow runtime can be generated.  ... 
doi:10.1007/978-0-387-35508-5_11 fatcat:mo5amjmh4vglfd2fgcbs77h4ue

A Framework for Distributed Preservation Workflows

Rainer Schmidt, Ross King, Andrew Jackson, Carl Wilson, Fabian Steeg, Peter Melms
2010 International Journal of Digital Curation  
The Planets integrated environment provides a number of end-user applications that allow data curators to execute and scientifically evaluate preservation experiments based on composable preservation services  ...  In this paper, we focus on the middleware and programming model and show how it can be utilised in order to create complex preservation workflows.  ...  Acknowledgments Work presented in this paper is partially supported by European Community under the Information Society Technologies (IST) Programme of the 6th FP for RTD -Project IST-033789.  ... 
doi:10.2218/ijdc.v5i1.154 fatcat:wiindi3byvedne4dhcc57nw35y
« Previous Showing results 1 — 15 out of 23,436 results