Sciweavers

653 search results - page 23 / 131
» Addressing interoperability issues in access control models
Sort
View
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 23 days ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
ARESEC
2011
110views more  ARESEC 2011»
12 years 8 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
NDSS
2003
IEEE
14 years 1 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
HPDC
2000
IEEE
14 years 11 days ago
Grid-based File Access: The Legion I/O Model
The unprecedented scale, heterogeneity, and varied usage patterns of grids pose significant technical challenges to any underlying file system that will support them. While grid...
Brian S. White, Andrew S. Grimshaw, Anh Nguyen-Tuo...
ACL
2000
13 years 9 months ago
A Hierarchical Account of Referential Accessibility
In this paper, we outline a theory of referential accessibility called Veins Theory (VT). We show how VT addresses the problem of "left satellites", currently a problem ...
Nancy Ide, Dan Cristea