Sciweavers

178 search results - page 9 / 36
» Access control for a replica management database
Sort
View
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
14 years 11 days ago
TCP Congestion Window Controlling Algorithms on iSCSI Sequential Read Access
iSCSI is one of the most promising technologies in IPSAN, which decreases a storage management cost. Congestion Window, one of TCP parameters, has a close relationship with system...
Machiko Toyoda, Masato Oguchi, Saneyasu Yamaguchi
DEXAW
1998
IEEE
94views Database» more  DEXAW 1998»
13 years 11 months ago
Towards Access Control for Logical Document Structures
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Fredj Dridi, Gustaf Neumann
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 1 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
ACSAC
2006
IEEE
14 years 26 days ago
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted...
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl...
SAINT
2005
IEEE
14 years 10 days ago
Design and Analysis of an e-Transaction Protocol Tailored for OCC
In this work we present a protocol ensuring the eTransaction guarantee (i.e. a recently proposed end-to-end reliability guarantee) in a Web based, three-tier transactional system....
Paolo Romano, Francesco Quaglia, Bruno Ciciani