Sciweavers

1779 search results - page 145 / 356
» A Formal Model of Data Privacy
Sort
View
ARESEC
2011
110views more  ARESEC 2011»
14 years 4 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
CODASPY
2011
14 years 8 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
DEXA
1994
Springer
137views Database» more  DEXA 1994»
15 years 8 months ago
RTSORAC: A Real-Time Object-Oriented Database Model
A real-time database is a database in which both the data and the operations upon the data may have timing constraints. We have integrated real-time, object-oriented, semantic and ...
Janet J. Prichard, Lisa Cingiser DiPippo, Joan Pec...
ICDCIT
2004
Springer
15 years 10 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
ADBIS
2006
Springer
131views Database» more  ADBIS 2006»
15 years 10 months ago
X-Warehousing: An XML-Based Approach for Warehousing Complex Data
XML is suitable for structuring complex data coming from different sources and supported by heterogeneous formats. It allows a flexible formalism capable to represent and store d...
Omar Boussaid, Riadh Ben Messaoud, Rémy Cho...