Sciweavers

178 search results - page 30 / 36
» Access control for a replica management database
Sort
View
SOSP
2003
ACM
14 years 3 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
DAGSTUHL
2007
13 years 8 months ago
Ubiquitous Nature of Event-Driven Approaches: A Retrospective View
This paper retrospectively analyzes the progress of event-based capability and their applicability in various domains. Although research on event-based approaches started in a hum...
Sharma Chakravarthy, Raman Adaikkalavan
WPES
2005
ACM
14 years 8 days ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
IWSEC
2007
Springer
14 years 26 days ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
DAWAK
2009
Springer
13 years 10 months ago
Skyline View: Efficient Distributed Subspace Skyline Computation
Skyline queries have gained much attention as alternative query semantics with pros (e.g.low query formulation overhead) and cons (e.g.large control over result size). To overcome ...
Jinhan Kim, Jongwuk Lee, Seung-won Hwang