Sciweavers

27 search results - page 5 / 6
» An Accidental Simula User
Sort
View
SDMW
2004
Springer
14 years 1 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
USENIX
2008
13 years 10 months ago
Fast, Inexpensive Content-Addressed Storage in Foundation
Foundation is a preservation system for users' personal, digital artifacts. Foundation preserves all of a user's data and its dependencies--fonts, programs, plugins, ker...
Sean C. Rhea, Russ Cox, Alex Pesterev
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 2 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
ACMSE
2005
ACM
13 years 9 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
EDCC
1994
Springer
13 years 11 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell