Sciweavers

831 search results - page 19 / 167
» A Security Concept for OLAP
Sort
View
ENTCS
2007
112views more  ENTCS 2007»
13 years 8 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
FUIN
2007
84views more  FUIN 2007»
13 years 8 months ago
Observation Based System Security
A formal model for description of passive and active timing attacks is presented, studied and compared with other security concepts. It is based on a timed process algebra and on a...
Damas P. Gruska
ENTCS
2008
83views more  ENTCS 2008»
13 years 8 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen
KDD
2009
ACM
157views Data Mining» more  KDD 2009»
14 years 3 months ago
Hierarchical difference scatterplots interactive visual analysis of data cubes
Data cubes as employed by On-Line Analytical Processing (OLAP) play a key role in many application domains. The analysis typically involves to compare categories of different hie...
Harald Piringer, Matthias Buchetics, Helwig Hauser...
DOLAP
2006
ACM
14 years 2 months ago
HYPE: mining hierarchical sequential patterns
Mining data warehouses is still an open problem as few approaches really take the specificities of this framework into account (e.g. multidimensionality, hierarchies, historized ...
Marc Plantevit, Anne Laurent, Maguelonne Teisseire