Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Philip W. L. Fong"'
Autor:
Syed Zain R. Rizvi, Philip W. L. Fong
Publikováno v:
ACM Transactions on Privacy and Security. 23:1-33
Neo4j is a popular graph database that offers two versions: an enterprise edition and a community edition . The enterprise edition offers customizable Role-based Access Control features through custom developed procedures , while the community editio
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030299613
ESORICS (2)
ESORICS (2)
In an open Internet-of-Things (IoT) environment, the chance encounters of smart devices have made it difficult to articulate access control policies for complete strangers. Based on the metaphor of public sphere, the access control model SEPD is prop
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a6a3ac9d33943b57c5254318284d702d
https://doi.org/10.1007/978-3-030-29962-0_10
https://doi.org/10.1007/978-3-030-29962-0_10
Publikováno v:
Computer Graphics Forum. 35:291-300
We present GSUVis, a visualization tool designed to provide better understanding of location-based social network (LBSN) data. LBSN data is one of the most important sources of information for transportation, marketing, health, and public safety. LBS
Publikováno v:
SACMAT
Event-based systems lie at the heart of many cloud-based Internet-of-Things (IoT) platforms. This combination of the Broker architectural style and the Publisher-Subscriber design pattern provides a way for smart devices to communicate and coordinate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6df2ba2ff8670d0fa920ee15d94cee79
http://arxiv.org/abs/1809.10134
http://arxiv.org/abs/1809.10134
Autor:
Philip W. L. Fong
Publikováno v:
CODASPY
First proposed by Wang and Li in 2007, workflow resiliency is a policy analysis for ensuring that, even when an adversarial environment removes a subset of workers from service, a workflow can still be instantiated to satisfy all the security constra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::132b323451e1e4c6ed053ebbf12cc519
http://arxiv.org/abs/1809.10106
http://arxiv.org/abs/1809.10106
Autor:
Sepideh Avizheh, Reihaneh Safavi-Naini, Tam Thanh Doan, K Muni Venkateswarlu, Shuai Li, Philip W. L. Fong
Publikováno v:
IoT S&P@SIGCOMM
Today's Smart Home platforms such as Samsung SmartThings and Amazon AWS IoT are primarily cloud based: devices in the home sense the environment and send the collected data, directly or through a hub, to the cloud. Cloud runs various applications and
Publikováno v:
SACMAT
Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constraints shall be imposed on permission
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e0cb4cd8b5d24b54eb9213423ab47c5b
http://arxiv.org/abs/1804.00086
http://arxiv.org/abs/1804.00086
Autor:
Philip W. L. Fong, Syed Zain R. Rizvi
Publikováno v:
CODASPY
Neo4j is a popular graph database that offers two versions; a paid enterprise edition and a free community edition. The enterprise edition offers customizable Role-Based Access Control (RBAC) features through custom developed procedures, while the co
Publikováno v:
SACMAT
Social Network Systems (SNSs) allow third-party extensions to access user profiles by providing an Application Programming Interface (API). It has been demonstrated in the literature that this API can be exploited by malicious extensions to infer use
Publikováno v:
ACM Transactions on Information and System Security. 17:1-31
Purpose is a key concept in privacy policies. Although some models have been proposed for enforcing purpose-based privacy policies , little has been done in defining formal semantics for purpose, and therefore an effective enforcement mechanism for s