Sciweavers

209 search results - page 16 / 42
» Exploiting Information Relationships for Access Control
Sort
View
166
Voted
EUROSYS
2008
ACM
16 years 16 days ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
MIDDLEWARE
2010
Springer
15 years 1 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
95
Voted
WWW
2004
ACM
16 years 4 months ago
Post-processing inkml for random-access navigation of voluminous handwritten ink documents
The goal of this research is the improvement of browsing voluminous InkML data in two areas: ease of rendering continuous inkflow for replay-browsing, and ease of random access na...
Khaireel A. Mohamed, Lioudmila Belenkaia, Thomas O...
140
Voted
CLOUD
2010
ACM
15 years 8 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
109
Voted
DIMVA
2010
15 years 4 months ago
Covertly Probing Underground Economy Marketplaces
Cyber-criminals around the world are using Internet-based communication channels to establish trade relationships and complete fraudulent transactions. Furthermore, they control an...
Hanno Fallmann, Gilbert Wondracek, Christian Platz...