Sciweavers

862 search results - page 127 / 173
» BISON: Providing Business Information Analysis as a Service
Sort
View
CCS
2006
ACM
13 years 11 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 2 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
ATAL
2010
Springer
13 years 8 months ago
Can we predict safety culture?
Safety culture is broadly recognized as important for Air Traffic Management and various studies have addressed its characterization and assessment. Nevertheless, relations betwee...
Alexei Sharpanskykh, Sybert H. Stroeve
ISCA
2008
IEEE
101views Hardware» more  ISCA 2008»
13 years 7 months ago
Scalability in Analyzing the Availability of Large-Scale Networks using Multicast
The goal of this paper is to identify and discuss scalability issues for the measurement-based analysis of the availability in large-scale networks using IP multicast technology. ...
Falko Dressler
JKM
2007
78views more  JKM 2007»
13 years 7 months ago
A framework for evaluating knowledge-mapping tools
The paper first deals with the much discussed issue of defining the term informatics. Then it explores how the term information science is understood by the students of the Facult...
Samuel Driessen, Willem-Olaf Huijsen, Marjan Groot...