• Aucun résultat trouvé

[PDF] Top 20 A contextual privacy-aware access control model for network monitoring workflows: work in progress

Has 10000 "A contextual privacy-aware access control model for network monitoring workflows: work in progress" found on our website. Below are the top 20 most common "A contextual privacy-aware access control model for network monitoring workflows: work in progress".

A contextual privacy-aware access control model for network monitoring workflows: work in progress

A contextual privacy-aware access control model for network monitoring workflows: work in progress

... of a new access control model that aims at dealing with all those aforementioned ...of network monitoring, capturing all the underlying concepts, ...Moreover, in order to ... Voir le document complet

11

Social Semantic Network-Based Access Control

Social Semantic Network-Based Access Control

... of contextual information sent by mobile consumers should not be taken for ...area in the Web, and initiatives such as WebID 24 specifically deal with this ...provide a survey of context ... Voir le document complet

36

Context-Aware Access Control for RDF Graph Stores

Context-Aware Access Control for RDF Graph Stores

... of contextual information sent by mobile consumers should not be taken for ...area in the Web, and initiatives such as WebID 17 specifically deal with this is- ...provide a survey of context ... Voir le document complet

7

Protecting sensitive data using differential privacy and role-based access control

Protecting sensitive data using differential privacy and role-based access control

... 3.4.2 Hadoop Distributed File System (HDFS) The Hadoop Distributed File System is designed to store massive amounts of data (terabytes or even petabytes), running on large clusters having thousands of nodes while ... Voir le document complet

102

A Chemistry-inspired Programming Model for Adaptive Decentralised Workflows

A Chemistry-inspired Programming Model for Adaptive Decentralised Workflows

... wrapped in one or several workers in parallel, depending on the size of the input parameters ...list. In other words, each time the gw_call rule is triggered, a new worker receives ... Voir le document complet

20

A model for evaluating affective relationships in distributed work

A model for evaluating affective relationships in distributed work

... limits. In fact, oral communication is not always richer than written ...dialogue in quasi-direct mode makes spontaneous communications ...as a rich one, they will use it in a richer ... Voir le document complet

8

"Improving Network Access Control Integrity through Redundant Mechanisms"

"Improving Network Access Control Integrity through Redundant Mechanisms"

... Access control policy modeling In order to have interesting simulation results we used the structure of our simulation software to represent real access control ...Since access ... Voir le document complet

4

Visualisation du sonore avec le logiciel egosound : work in progress

Visualisation du sonore avec le logiciel egosound : work in progress

... L’auditeur a donc la possibilité de se déplacer virtuellement au sein de cet espace ...il a la possibilité de modifier en temps réel les caractéristiques (norme et angle) du vecteur élémentaire de ... Voir le document complet

11

A Network-Aware Approach for Searching As-You-Type in Social Media

A Network-Aware Approach for Searching As-You-Type in Social Media

... Adaptations for the network-aware case Due to lack of space, we only sketch in this section the neces- sary extensions to Algorithm 1 for arbitrary α values, hence for any ... Voir le document complet

11

A highly adaptable probabilistic model for self-diagnosis of GPON-FTTH access network

A highly adaptable probabilistic model for self-diagnosis of GPON-FTTH access network

... approaches for self-diagnosing of telecommunication networks develop reasonings based on formal and explicit representation of network structure and network ...behavior. Network behavior ... Voir le document complet

6

Fire-control radar model laboratory work

Fire-control radar model laboratory work

... call for (electromag- netic, electronic, control, signal processing), each one hav- ing its specific ...through a real-life application, we have decided to design a fire-control ... Voir le document complet

5

Context-aware computing using a shared contextual information service

Context-aware computing using a shared contextual information service

... been a positive one. The use of a single interface that is familiar to many users (SQL) simplifies the application development and the SQL-like interface appears to be rich enough for the “basic” ... Voir le document complet

7

An evaluation of a network smoke control model

An evaluation of a network smoke control model

... This publication could be one of several versions: author’s original, accepted manuscript or the publisher’s version. / La version de cette publication peut être l’une des suivantes : la version prépublication de ... Voir le document complet

11

Investigation of Network-based Approaches for Privacy

Investigation of Network-based Approaches for Privacy

... Attack In order to prevent an eavesdropper from relating an outbound packet with an earlier inbound one based on timing or sequence of arrival, all data cells arriving at an onion router within a fixed time ... Voir le document complet

35

Review of Network-Based Approaches for Privacy

Review of Network-Based Approaches for Privacy

... direction for further research in this field should be in the areas of: prevention of attacks implementation issues, and private community building ...any network security protocol is to find ... Voir le document complet

12

OverFlow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds

OverFlow: Multi-Site Aware Big Data Management for Scientific Workflows on Clouds

... solutions. A number of such systems emerged in the context of the GridFTP [28] transfer tool, initially developed for ...grids. In these private infrastructures, informa- tion about the ... Voir le document complet

15

A Network Aware Resource Discovery Service

A Network Aware Resource Discovery Service

... [2].) In this graph, according to their roles, we can distinguish three different kind of ASes: Tier-1, Tier-2, and ...Tier-3. A Tier-1 is an AS that can reach every other destination on the Internet ... Voir le document complet

17

Virtual Staff - Software Tool for Cooperative Work in a Health Care Network

Virtual Staff - Software Tool for Cooperative Work in a Health Care Network

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ... Voir le document complet

41

Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the Fosstrak platform

Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the Fosstrak platform

... offers a new way of automating the identification and storing of information in RFID ...opportunities for the use of RFID technology in human centric applications like monitoring and ... Voir le document complet

23

Privacy Aware On-Demand Resource Provisioning for IoT Data Processing

Privacy Aware On-Demand Resource Provisioning for IoT Data Processing

... deployment in the most efficient and reliable way. Adaptation in PaaSage relies on the ...through monitoring and form the basis of detecting deviations between the current deployment and ... Voir le document complet

11

Show all 10000 documents...