Control Data Sharing

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigation of Sharing and Reuse of Research Data among Researchers

Purpose: Sharing research data leads to the reusing that data. The purpose   is to describe the status of sharing and reusing research data amongst researchers. This examines the attitude, experience and barriers in reusing research data. Methodology: Applied quantitative survey method was used. Population  was 154 participants all faculty members of Azarbaijan Shahid Madani University. Instrum...

متن کامل

Access Control for Sharing Semantic Data across Desktops

Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obviously, sharing desktop data with co-workers raises privacy and access control issues which have to be addressed. In this paper we discuss these issues, and present appropriate solutions. In line with the architecture of current PI...

متن کامل

Capability-Based Access Control for Peer-to-Peer Data Sharing

This paper describes SharedViews, a peer-to-peer data management system that simplifies file organization and facilitates file sharing and protection among home users on the Internet. The key innovation of SharedViews is the integration of queries and dynamic views from database systems with a capability-based protection model from the operating systems world. Users organize their files using v...

متن کامل

Access Control for Home Data Sharing: Attitudes, Needs and Practices

As digital content becomes more prevalent in the home, non-technical users are increasingly interested in sharing that content with others and accessing it from multiple devices. Not much is known about how these users think about controlling access to this data. To better understand this, we conducted semi-structured, in-situ interviews with 33 users in 15 households. We found that users creat...

متن کامل

Privacy Enhanced Access Control for Outsourced Data Sharing

Traditional access control models often assume that the entity enforcing access control policies is also the owner of data and resources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider. Howeve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Bulletin of the Society of Pharmacological and Environmental Pathologists

سال: 1972

ISSN: 0094-1824

DOI: 10.1177/019262337200100103