Sciweavers

872 search results - page 62 / 175
» An Access Control Language for a General Provenance Model
Sort
View
CCS
2010
ACM
13 years 6 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
MM
2004
ACM
106views Multimedia» more  MM 2004»
14 years 1 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
FIW
2007
133views Communications» more  FIW 2007»
13 years 9 months ago
Conflict Detection in Call Control Using First-Order Logic Model Checking
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...
BDA
1998
13 years 9 months ago
Methods and views
Many papers have been written on the structural aspect of view mechanisms for object-oriented databases. A clean model that focuses speci cally on the interplay between methods an...
Jan Van den Bussche, Emmanuel Waller
ANSS
2006
IEEE
14 years 1 months ago
Performance Modeling and Evaluation of E-Business Systems
A general model of an E-business system comprising an Application Server and a Database engine is analyzed and evaluated. Incoming jobs, once admitted for processing, compete for ...
Giovanna Ferrari, Paul D. Ezhilchelvan, Isi Mitran...