Sciweavers

423 search results - page 59 / 85
» A Logical Approach to Dynamic Role-Based Access Control
Sort
View
FCCM
2007
IEEE
129views VLSI» more  FCCM 2007»
14 years 3 months ago
Automatic On-chip Memory Minimization for Data Reuse
FPGA-based computing engines have become a promising option for the implementation of computationally intensive applications due to high flexibility and parallelism. However, one...
Qiang Liu, George A. Constantinides, Konstantinos ...
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 4 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
DEXA
2008
Springer
111views Database» more  DEXA 2008»
13 years 10 months ago
Translating SQL Applications to the Semantic Web
Abstract. The content of most Web pages is dynamically derived from an underlying relational database. Thus, the success of the Semantic Web hinges on enabling access to relational...
Syed Hamid Tirmizi, Juan Sequeda, Daniel P. Mirank...
ACSAC
2000
IEEE
14 years 1 months ago
Secure Smart Homes using Jini and UIUC SESAME
In this paper, we discuss our approach to constructing a dynamic and secure “Smart Home” environment and tackling the challenges associated with it. We envision a Smart Home a...
Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas...
IDEAS
2005
IEEE
124views Database» more  IDEAS 2005»
14 years 2 months ago
Flexible Update Management in Peer-to-Peer Database Systems
Promising the combination of dynamic configuration, scalability and redundancy, peer-to-peer (P2P) networks have garnered tremendous interest lately. Before long, this interest ex...
David Del Vecchio, Sang Hyuk Son