Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
A complete and efficient strategy based on petri net in automated trust negotiation
Proceedings of the 2nd international conference on Scalable information systems
ACM Transactions on Information and System Security (TISSEC)
A Novel Secure Interoperation System
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
ERDRM: A Digital Rights Management System Model for Educational Resources
ICWL '08 Proceedings of the 7th international conference on Advances in Web Based Learning
Expert Systems with Applications: An International Journal
Proceedings of the 2nd international conference on Security of information and networks
Towards controlling virus propagation in information systems with point-to-group information sharing
Decision Support Systems
Security-enhanced OSGi service environments
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
How to authenticate graphs without leaking
Proceedings of the 13th International Conference on Extending Database Technology
ASITL: adaptive secure interoperation using trust-level
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Trust and privacy in attribute based access control for collaboration environments
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Constructing authorization systems using assurance management framework
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Expert Systems with Applications: An International Journal
Introducing a cross federation identity solution for converged network environments
Principles, Systems and Applications of IP Telecommunications
DWEVOLVE: a requirement based framework for data warehouse evolution
ACM SIGSOFT Software Engineering Notes
Extracting trust information from security system of a service
Journal of Network and Computer Applications
Exploring barriers to knowledge flow at different knowledge management maturity stages
Information and Management
Estimating NBC-based recommendations on arbitrarily partitioned data with privacy
Knowledge-Based Systems
Toward designing a secure biosurveillance cloud
The Journal of Supercomputing
Security similarity based trust in cyber space
Knowledge-Based Systems
Future Generation Computer Systems
Hi-index | 0.00 |
Knowledge management enhances the value of a corporation by identifying the assets and expertise as well as efficiently managing the resources. Security for knowledge management is critical as organizations have to protect their intellectual assets. Therefore, only authorized individuals must be permitted to execute various operations and functions in an organization. In this paper, secure knowledge management will be discussed, focusing on confidentiality, trust, and privacy. In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored