Towards privacy enhancement in policy-based system

被引:0
|
作者
Khurat, Assadarat [1 ]
Abendroth, Joerg [1 ]
机构
[1] Corporate Technology, Siemens AG, Otto-Hahn-Ring 6, 81739 Munich, Germany
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:576 / 583
相关论文
共 50 条
  • [31] Towards an Architecture for Policy-Based Management of Software Defined Coalitions
    Williams, C.
    Bertino, E.
    Verma, D.
    Calo, S.
    Leung, K.
    Dearlove, C.
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [32] Towards a Policy-Based Distributed Data-Sharing Economy
    Cauvin, Samuel R.
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS (AAMAS' 18), 2018, : 1733 - 1734
  • [33] A proactive policy-based management approach towards autonomic communications
    Gu, Xiayuan
    Klie, Torsten
    Wolf, Lars
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 587 - 592
  • [34] Policy-Based Signatures
    Bellare, Mihir
    Fuchsbauer, Georg
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 520 - 537
  • [35] Policy-based networking
    Chadha, R
    Lapiotis, G
    Wright, S
    IEEE NETWORK, 2002, 16 (02): : 8 - 9
  • [36] Engineering a policy-based system for federated healthcare databases
    Bhatti, Rafae
    Samuel, Arjmand
    Eltabakh, Mohamed Y.
    Amjad, Haseeb
    Ghafoor, Arif
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (09) : 1288 - 1304
  • [37] Towards usage-based accounting: Applying policy-based intelligent agents
    Karsten, M
    Roos, J
    Steenekamp, PJ
    TELETRAFFIC CONTRIBUTIONS FOR THE INFORMATION AGE, 1997, 2 : 633 - 642
  • [38] Policy-Based Access Control System for Delta Lake
    Chen, Zhe
    Shao, Hangyu
    Li, Yuping
    Lu, Hongru
    Jin, Jiahui
    2022 TENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, CBD, 2022, : 60 - 65
  • [39] A Policy-based CAC Scheme for Fixed WiMAX System
    Luo, Sida
    Li, Zhishu
    Hu, Tan
    Liu, Tao
    Cai, Biao
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 376 - 379
  • [40] A proposal of protocol and policy-based intrusion detection system
    Baba, T
    Matsuda, S
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL, III, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 365 - 370