Sciweavers

518 search results - page 40 / 104
» Abstract Interpretation-Based Protection
Sort
View
123
Voted
JUCS
2010
155views more  JUCS 2010»
14 years 9 months ago
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
Abstract: Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of...
Raju Halder, Shantanu Pal, Agostino Cortesi
201
Voted
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
16 years 2 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
117
Voted
RTSS
2009
IEEE
15 years 9 months ago
On the Scheduling of Mixed-Criticality Real-Time Task Sets
Abstract—The functional consolidation induced by the costreduction trends in embedded systems can force tasks of different criticality (e.g. ABS Brakes with DVD) to share a proce...
Dionisio de Niz, Karthik Lakshmanan, Ragunathan Ra...
141
Voted
SACMAT
2005
ACM
15 years 8 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
140
Voted
CCS
2006
ACM
15 years 6 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...