Sciweavers

2024 search results - page 339 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
110
Voted
EDOC
2006
IEEE
15 years 8 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Ashish Kundu, Elisa Bertino
ICDCS
2005
IEEE
15 years 8 months ago
An Update Protocol for XML Documents in Distributed and Cooperative Systems
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ens...
Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elen...
135
Voted
ESORICS
2000
Springer
15 years 6 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
97
Voted
GEOINFORMATICA
2008
135views more  GEOINFORMATICA 2008»
15 years 2 months ago
Automatically and Accurately Conflating Raster Maps with Orthoimagery
Recent growth of geospatial information online has made it possible to access various maps and orthoimagery. Conflating these maps and imagery can create images that combine the vi...
Ching-Chien Chen, Craig A. Knoblock, Cyrus Shahabi
152
Voted
INTENSIVE
2009
IEEE
15 years 9 months ago
A Service for Data-Intensive Computations on Virtual Clusters
Digital Preservation deals with the long-term storage, access, and maintenance of digital data objects. In order to prevent a loss of information, digital libraries and archives a...
Rainer Schmidt, Christian Sadilek, Ross King