Sciweavers

1235 search results - page 164 / 247
» Formalizing information security knowledge
Sort
View
CASCON
2008
255views Education» more  CASCON 2008»
13 years 9 months ago
Autonomic tuning expert: a framework for best-practice oriented autonomic database tuning
Databases are growing rapidly in scale and complexity. High performance, availability, and further service level agreements need to be satisfied under any circumstances to please ...
David Wiese, Gennadi Rabinovitch, Michael Reichert...
ARTMED
2006
85views more  ARTMED 2006»
13 years 7 months ago
Using ontologies linked with geometric models to reason about penetrating injuries
Medical assessment of penetrating injuries is a difficult and knowledge-intensive task. Physical examination and computed tomographic (CT) imaging data must be combined with detai...
Daniel L. Rubin, Olivier Dameron, Yasser Bashir, D...
SACMAT
2009
ACM
14 years 2 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
ACSAC
2002
IEEE
14 years 24 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni