Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2011
Next steps in e-government crowdsourcing
dg.o '11: Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging TimesPages 177–181https://doi.org/10.1145/2037556.2037582In the US, the Federal Administration's Open Government Initiative has spurred use of crowdsourcing tools for several types of citizen participation. Likewise, US states and municipalities have implemented several forums. A survey of crowdsourcing ...
- research-articleJuly 2010
Role Engineering via Prioritized Subset Enumeration
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 7, Issue 3Pages 300–314https://doi.org/10.1109/TDSC.2008.61Today, role-based access control (RBAC) has become a well-accepted paradigm for implementing access control because of its convenience and ease of administration. However, in order to realize the full benefits of the RBAC paradigm, one must first define ...
- articleApril 2010
Finding information in an era of abundance: Towards a collaborative tagging environment in government
Information Polity (INPOL), Volume 15, Issue 1,2Pages 89–103Collaboration and information sharing among government organizations is becoming increasingly important for promoting efficiency and productivity as well as for enhancing citizen services. With Internet connectivity widely available and with the ease-of-...
-
- research-articleMay 2009
Social networking -- technology, tools, and applications: a hands-on tutorial to make the most of the conference
Types and applications for social networking have exploded. This tutorial will give participants a working knowledge of the technology, tools and applications with examples of how they are being used by governments and in support of the dg.o 2009 ...
- research-articleMay 2009
Semantic and pragmatic annotation for government information discovery, sharing and collaboration
Collaboration and information sharing between organizations that share a common goal is becoming increasingly important. Effective sharing promotes efficiency and productivity as well as enhances customer service. With Internet connectivity widely ...
- articleApril 2009
Privacy protection in government mashups
The Web 2.0 technologies allow dynamic content creation using syndications or mashups, extracted from diverse data sources, including government enterprise data. As a primary source of citizen data, the US government has the obligation not only to make ...
- ArticleJuly 2008
Semantic Annotation and Search for Deep Web Services
CECANDEEE '08: Proceedings of the 2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-ServicesPages 389–395https://doi.org/10.1109/CECandEEE.2008.141In this paper, we recognize the shortcomings of the current search engines that do not index and search the Deep Web. We present requirements of a Deep Web Service search engine, that will lead to the query objects in the deep data sources. In order to ...
- research-articleMay 2008
A citizen privacy protection model for e-government mashup services
dg.o '08: Proceedings of the 2008 international conference on Digital government researchPages 188–196The Web 2.0 technologies allow dynamic content creation using syndications or mashups, extracted from diverse data sources, including government enterprise data. As a primary source of citizen data, the government has the obligation not only to make ...
- ArticleJune 2007
Using semantics for automatic enforcement of access control policies among dynamic coalitions
SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologiesPages 235–244https://doi.org/10.1145/1266840.1266877In a dynamic coalition environment, organizations should be able to exercise their own local fine-grained access control policies while sharing resources with external entities. In this paper, we propose an approach that exploits the semantics ...
- doctoral_thesisJanuary 2007
Secure resource sharing in dynamic ad-hoc collaborations
Due to the proliferation of the Internet and web based technologies, coalitions among organizations are increasingly short-lived and dynamic. They are, therefore, formed in an ad-hoc manner to serve a specific purpose using open environments that ...
- ArticleOctober 2006
RoleMiner: mining roles using subset enumeration
CCS '06: Proceedings of the 13th ACM conference on Computer and communications securityPages 144–153https://doi.org/10.1145/1180405.1180424Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially, there are two basic approaches to accomplish this: the top-down and the ...
- ArticleJuly 2006
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach
It is often necessary for organizations to come together in a coalition to share services, without prior planning, to accomplish certain tasks. The dynamic coalition-based access control DCBAC model facilitates the formation of dynamic coalitions ...
- ArticleJune 2006
Inter-instance authorization constraints for secure workflow management
SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologiesPages 190–199https://doi.org/10.1145/1133058.1133085Work flows model and control the execution of business process in an organization. They are typically comprised of tasks or logical steps in the business process. To mitigate the ability of insiders to commit fraud, care should be taken that people ...
- ArticleMay 2006
Secure interoperation for effective data mining in border control and homeland security applications
dg.o '06: Proceedings of the 2006 international conference on Digital government researchPages 124–125https://doi.org/10.1145/1146598.1146636Our NSF funded project aims at providing decision makers with the ability to extract and fuse information from multiple, hetertgeneous sources in response to a query while operating under a decentralized security administration. Our motivation comes from ...
- ArticleDecember 2005
An attribute graph based approach to map local access control policies to credential based access control policies
ICISS'05: Proceedings of the First international conference on Information Systems SecurityPages 134–147https://doi.org/10.1007/11593980_10Due to the proliferation of the Internet and web based technologies, today's collaborations among organizations are increasingly short-lived, dynamic, and therefore formed in an ad-hoc manner to serve a specific purpose. Such example environments ...
- ArticleAugust 2005
A credential-based approach for facilitating automatic resource sharing among ad-hoc dynamic coalitions
DBSec'05: Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications SecurityPages 252–266https://doi.org/10.1007/11535706_19Today, there is an increasing need for dynamic, efficient and secure sharing of resources among organizations. In a dynamic coalition environment, participants (including users and systems) of an organization may need to gain access quickly to resources ...