Abstract

The deployment of Share Data Spaces in open, possible hostile, environments arises the need of protecting the confidentiality of the data space content. The approaches that have been proposed focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrator) where the data… (More)

Topics

4 Figures and Tables

Slides referencing similar topics