Sciweavers

3305 search results - page 78 / 661
» Can we Rely on SQL
Sort
View
DIAU
2000
Springer
14 years 1 days ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel
CCS
2007
ACM
14 years 1 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
ISF
2010
273views more  ISF 2010»
13 years 5 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
ECCV
2004
Springer
14 years 9 months ago
Tracking People with a Sparse Network of Bearing Sensors
Recent techniques for multi-camera tracking have relied on either overlap between the fields of view of the cameras or on a visible ground plane. We show that if information about ...
Ali Rahimi, Brian Dunagan, Trevor Darrell
MOC
2000
77views more  MOC 2000»
13 years 7 months ago
Isomorphisms between Artin-Schreier towers
We give a method for efficiently computing isomorphisms between towers of Artin-Schreier extensions over a finite field. We find that isomorphisms between towers of degree pn over ...
Jean Marc Couveignes