Partners in VOs can share large amount of data. Sharing of individual data items is straightforward, but sharing components of complex data structures stored in heterogeneous systems is often a challenge. Sharing is typically governed by rules and policies that need to be translated into access right / privilege control and data granularity control. Simultaneous control of privileges and data granularity across different organizations is a difficult task, and most traditional approaches, such role-based access control can become prohibitively complex in such scenarios. We propose a scheme for concurrent control of subject privileges and object granularity. It includes participants, duties and operations, and generates security labels that d...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
Interoperation and services sharing among different systems are becoming new paradigms for enterpris...
Cloud computing is extensively used as an integration means in varies application domains, spanning ...
Enterprise-scale organizations have large numbers of internal and external users, with different pri...
Enterprise-scale organizations have large numbers of internal and external users, with different pri...
Access control must provide a secure environment for collaboration among independent organizations w...
International audienceAbstract. In the context of cooperative information systems, research focused ...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
Access control is an indispensable part of any information sharing system. Collaborative environment...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
Access control is an indispensable part of any information sharing system. Collaborative environment...
This paper proposes a trust involved management framework for supporting privacy preserving access c...
There is often a misalignment between requirements for keeping data owners' information private and ...
This report proposes a security model designed to support cooperative tasks in which the security of...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
Interoperation and services sharing among different systems are becoming new paradigms for enterpris...
Cloud computing is extensively used as an integration means in varies application domains, spanning ...
Enterprise-scale organizations have large numbers of internal and external users, with different pri...
Enterprise-scale organizations have large numbers of internal and external users, with different pri...
Access control must provide a secure environment for collaboration among independent organizations w...
International audienceAbstract. In the context of cooperative information systems, research focused ...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
Access control is an indispensable part of any information sharing system. Collaborative environment...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
Access control is an indispensable part of any information sharing system. Collaborative environment...
This paper proposes a trust involved management framework for supporting privacy preserving access c...
There is often a misalignment between requirements for keeping data owners' information private and ...
This report proposes a security model designed to support cooperative tasks in which the security of...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
Interoperation and services sharing among different systems are becoming new paradigms for enterpris...
Cloud computing is extensively used as an integration means in varies application domains, spanning ...