منابع مشابه
Investigation of Sharing and Reuse of Research Data among Researchers
Purpose: Sharing research data leads to the reusing that data. The purpose is to describe the status of sharing and reusing research data amongst researchers. This examines the attitude, experience and barriers in reusing research data. Methodology: Applied quantitative survey method was used. Population was 154 participants all faculty members of Azarbaijan Shahid Madani University. Instrum...
متن کاملAccess Control for Sharing Semantic Data across Desktops
Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obviously, sharing desktop data with co-workers raises privacy and access control issues which have to be addressed. In this paper we discuss these issues, and present appropriate solutions. In line with the architecture of current PI...
متن کاملCapability-Based Access Control for Peer-to-Peer Data Sharing
This paper describes SharedViews, a peer-to-peer data management system that simplifies file organization and facilitates file sharing and protection among home users on the Internet. The key innovation of SharedViews is the integration of queries and dynamic views from database systems with a capability-based protection model from the operating systems world. Users organize their files using v...
متن کاملAccess Control for Home Data Sharing: Attitudes, Needs and Practices
As digital content becomes more prevalent in the home, non-technical users are increasingly interested in sharing that content with others and accessing it from multiple devices. Not much is known about how these users think about controlling access to this data. To better understand this, we conducted semi-structured, in-situ interviews with 33 users in 15 households. We found that users creat...
متن کاملPrivacy Enhanced Access Control for Outsourced Data Sharing
Traditional access control models often assume that the entity enforcing access control policies is also the owner of data and resources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider. Howeve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Bulletin of the Society of Pharmacological and Environmental Pathologists
سال: 1972
ISSN: 0094-1824
DOI: 10.1177/019262337200100103