Linguistic protocols for secure information management and sharing
نویسندگان
چکیده
منابع مشابه
Authorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملSecure information sharing and analysis for effective emergency management
Effective incident management and response requires timely and coordinated decision making. 9/11, Katrina and other emergent events demonstrate the need for effective information sharing and decision support at the operational as well as at the strategic levels. There has been significant work on emergency response at the first-responder level. This paper addresses the challenge of integrating,...
متن کاملSecure sharing in distributed information management applications: problems and directions
Interaction between entities who may not trust each other is now commonplace on the Internet. This paper focuses on the specific problem of sharing information between distrusting parties. Previous work in this area shows that privacy and utility can co-exist, but often do not provide strong assurances of one or the other. In this paper, we sketch a research agenda with several directions for a...
متن کاملBayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication, content integrity or access control, presents several difficulties, most of them due to the decentralized nature of these environments and the lack of central authorities. Even though some solutions have been alread...
متن کاملSharing @ The Edge: Secure Information Sharing
Peer-to-peer (P2P) computing promises to return the World Wide Web to an environment where the edge of the network is as important as the Web servers that have dominated its early years. This paper describes issues associated with P2P computing that must be solved before widespread deployment is possible. The paper presents a P2P solution where services and content are equally secured and can b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Mathematics with Applications
سال: 2012
ISSN: 0898-1221
DOI: 10.1016/j.camwa.2011.10.038