Sciweavers

2817 search results - page 537 / 564
» A Framework for the Management of Information Security
Sort
View
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 9 months ago
Mining relational data through correlation-based multiple view validation
Commercial relational databases currently store vast amounts of real-world data. The data within these relational repositories are represented by multiple relations, which are int...
Hongyu Guo, Herna L. Viktor
MOBISYS
2008
ACM
14 years 8 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 3 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
TAPIA
2009
ACM
14 years 1 months ago
Research experiences for undergraduates: autonomic computing research at FIU
According to Computing Research Association, during each year between 2003 and 2007, fewer than 3% of the US’s Ph.D.s graduates in computer science and computer engineering were...
Masoud Milani, Seyed Masoud Sadjadi, Raju Rangaswa...
DRM
2006
Springer
14 years 13 days ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...