Sciweavers

661 search results - page 56 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
CSREASAM
2009
13 years 8 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
EDBT
2008
ACM
137views Database» more  EDBT 2008»
14 years 7 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
MOBISYS
2007
ACM
14 years 7 months ago
Improving mobile database access over wide-area networks without degrading consistency
We report on the design, implementation, and evaluation of a system called Cedar that enables mobile database access with good performance over low-bandwidth networks. This is acc...
Niraj Tolia, Mahadev Satyanarayanan, Adam Wolbach
FIDJI
2004
Springer
14 years 1 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis