Sciweavers

151 search results - page 18 / 31
» Flexible Alias Protection
Sort
View
IASTEDSEA
2004
13 years 9 months ago
Instance orientation: A programming methodology
Instance orientation is an approach for designing and programming software systems. It addresses a limitation of current software architectures: it allows multiple higherlevel vie...
Thomas Schöbel-Theuer
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 7 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
SIGCSE
2002
ACM
207views Education» more  SIGCSE 2002»
13 years 7 months ago
Exploration of process interaction in operating systems: a pipe-fork simulator
Abstract This paper examines the use of a simulator to explore process interaction in Unix. The simulator allows instructors to trace through a variety of programs and to show how ...
Steven Robbins
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 9 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
14 years 28 days ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov