• Aucun résultat trouvé

[PDF] Top 20 Context-aware access control and presentation of linked data

Has 10000 "Context-aware access control and presentation of linked data" found on our website. Below are the top 20 most common "Context-aware access control and presentation of linked data".

Context-aware access control and presentation of linked data

Context-aware access control and presentation of linked data

... the Linked Data community spent a considerable effort on defining best practices for publishing data, and achieved concrete results, promising research on the front of consuming such ... Voir le document complet

145

SHI3LD: an Access Control Framework for the Mobile Web of Data

SHI3LD: an Access Control Framework for the Mobile Web of Data

... another context ontology: our model includes base classes and properties only, as we delegate refinements and extensions to domain specialists, in the light of the Web of Data ... Voir le document complet

3

Enhancing context data distribution for the internet of things using qoc-awareness and attribute-based access control

Enhancing context data distribution for the internet of things using qoc-awareness and attribute-based access control

... Overhead of QoC-based filters depending on the number of constraints at B ot her Under an open world assumption where data can be com- bined with external sources, recent works have shown that ... Voir le document complet

13

Authorization policies: Using Decision Support System for context-aware protection of user's private data

Authorization policies: Using Decision Support System for context-aware protection of user's private data

... Attribute-based Access Control Roles aren’t always efficient in a dynamic, open and context-aware system to structure authorization ...attributes and to define access ... Voir le document complet

7

Towards a context aware modeling of trust and access control based on the user behavior and capabilities

Towards a context aware modeling of trust and access control based on the user behavior and capabilities

... monitoring data provided over the time from different sources in order to update the behavior ...efficiency of an adaptive access control and the role of tracking the behavior, ... Voir le document complet

9

A contextual privacy-aware access control model for network monitoring workflows: work in progress

A contextual privacy-aware access control model for network monitoring workflows: work in progress

... monitoring, access control, privacy, context, workflows 1 Introduction Network monitoring is characterised by certain features that stress the need for special mechanisms controlling access to ... Voir le document complet

11

Authorization policies: Using Decision Support System for context-aware protection of user's private data

Authorization policies: Using Decision Support System for context-aware protection of user's private data

... Attribute-based Access Control Roles aren’t always efficient in a dynamic, open and context-aware system to structure authorization ...attributes and to define access ... Voir le document complet

8

Context-Aware Access Control for RDF Graph Stores

Context-Aware Access Control for RDF Graph Stores

... mobile context, other issues need to be consid- ered beyond context-model definition, such as context fetch, context trustworthiness and ...that context data is fetched ... Voir le document complet

7

Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores

Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores

... mobile context in which linked data consumption takes ...the access control model and the contextual vocabulary into context-aware access conditions defined ... Voir le document complet

9

Context-aware, Autonomous and Smart Architectures (CASA@ECSA 2017)

Context-aware, Autonomous and Smart Architectures (CASA@ECSA 2017)

... two of the accepted papers are position papers proposing approaches which concern a context-aware offloading framework in 5G for an augmented reality application, and system integration ... Voir le document complet

4

Cryptographically enforced access control for user data in untrusted clouds

Cryptographically enforced access control for user data in untrusted clouds

... encrypt data before uploading it. However, the ultimate purpose of uploading data is to share it with third party ...cloud data across multiple services, but these protocols have major ... Voir le document complet

60

Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

Access Control Mechanisms in Named Data Networks: A Comprehensive Survey

... University of Nebraska Omaha, USA HASSINE MOUNGLA, Université de Paris, France Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that ... Voir le document complet

33

Context-aware systems : a case study

Context-aware systems : a case study

... (Information and Communication Technologies), especially in professional environments, are enhancing communication between ...amount of stress to workers because they are loosing the control on the ... Voir le document complet

16

OLAP queries context-aware recommender system

OLAP queries context-aware recommender system

... distribution of the recorded F-measure for the 10 validations (d1-10 is the log with 100 sessions, d1-9 contains the 9 more recent deciles, 90 sessions, ...... and d1 contains the more recent decile, 10 ... Voir le document complet

12

Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

... for access control models. The use of cryptographic systems can ensure the security of data while transferred between ...credentials, and a party encrypting data ... Voir le document complet

11

Arbitrage and control problems in finance: A presentation

Arbitrage and control problems in finance: A presentation

... Huang and Pagès (1992) extended this methodology to the in…nite hori- zon ...Sethi and Shreve (1986) provided explicit computations in that framework assuming constant coefficients in the price evo- lution ... Voir le document complet

21

comMotion : a context-aware communication system

comMotion : a context-aware communication system

... * accessibility of information - the to-do list items and reminders are accessible to the user regardless of his place and time. In certain systems, users can only[r] ... Voir le document complet

84

Normative Requirements as Linked Data

Normative Requirements as Linked Data

... Keywords. Linked data, Semantic Web, Deontic rules, Ontology ...The Linked Data principles [3] provide a standard approach to weave a Web of data, linking datasets across the ... Voir le document complet

11

2019 — Towards automatic context-aware summarization of code entities

2019 — Towards automatic context-aware summarization of code entities

... generation of short summaries of commits since most developers need concise ideas on commit messages that may be so long ...users and automatically generated ...messages and considered ... Voir le document complet

87

Unified Modeling of Quality of Context and Quality of Situation for Context-Aware Applications in the Internet of Things

Unified Modeling of Quality of Context and Quality of Situation for Context-Aware Applications in the Internet of Things

... amount of context data available in the IoT, detecting situa- tions of interest in pervasive systems is a crucial ...Ontological Context Manager (OCM) with an Adaptive Multi-Agent ... Voir le document complet

6

Show all 10000 documents...