International audienceWith more and more information being exchanged or published on the Web or in peer-to-peer, and with the significant growth in numbers of distributed, heterogeneous data sources, issues like access control and data privacy are becoming increasingly complex and difficult to manage. Very often, when dealing with sensitive information in such settings, the specification of access control policies and their enforcement are no longer handled by the actual data sources, and are (partially) delegated to third-parties. Besides practical reasons, this is the case when decisions regarding access depend on factors which overpass the scope and knowledge of some of the entities involved. More specifically, policies may depend on \em...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
International audienceThe management of Web users' personal information is increasingly distributed ...
Abstract. Traditional access control models often assume that the en-tity enforcing access control p...
International audienceWith more and more information being exchanged or published on the Web or in p...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
The tremendous growth in electronic media has made publication of information in either open or clos...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Current access control models typically assume that resources are under the strict custody of a trus...
The evolution of information and communication technologies (ICTs) has introduced new ways for shari...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
Abstract. The intent of peer data management systems (PDMS) is to share as much data as possible. Ho...
There is often a misalignment between requirements for keeping data owners' information private and ...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
The amount of information held by organizations' databases is increasing very quickly. A recently pr...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
International audienceThe management of Web users' personal information is increasingly distributed ...
Abstract. Traditional access control models often assume that the en-tity enforcing access control p...
International audienceWith more and more information being exchanged or published on the Web or in p...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
The tremendous growth in electronic media has made publication of information in either open or clos...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Current access control models typically assume that resources are under the strict custody of a trus...
The evolution of information and communication technologies (ICTs) has introduced new ways for shari...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
Abstract. The intent of peer data management systems (PDMS) is to share as much data as possible. Ho...
There is often a misalignment between requirements for keeping data owners' information private and ...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
The amount of information held by organizations' databases is increasing very quickly. A recently pr...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
International audienceThe management of Web users' personal information is increasingly distributed ...
Abstract. Traditional access control models often assume that the en-tity enforcing access control p...