Sciweavers

3000 search results - page 175 / 600
» Accessing an Information System by Chatting
Sort
View
CCS
2006
ACM
14 years 1 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
ICDCSW
2003
IEEE
14 years 2 months ago
Entry Points into a Smart Campus Environment - Overview of the ETHOC System
The university campus is an interesting application environment for the ubiquitous computing paradigm: a large number of users share a substantial amount of their information need...
Michael Rohs, Jürgen Bohn
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
CAISE
2006
Springer
14 years 1 months ago
A Personalized and Context-Aware Adaptation Process for Web-Based Groupware Systems
The evolution of mobile technologies, like web-enable cellphones, PDAs and wireless networks, makes it now possible to use these technologies for collaborative work through web-bas...
Manuele Kirsch-Pinheiro, Marlène Villanova-...
RIDE
1993
IEEE
14 years 1 months ago
Integration of Relational Databases in a Multidatabase System based on Schema Enrichment
In this paper, we describe a framework for an object-oriented modeling of meta information and its use for the integration of heterogeneous databases with the goal of their intero...
Daniel A. Keim, Hans-Peter Kriegel, Andreas Mieths...