Sciweavers

804 search results - page 57 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ICDE
2005
IEEE
137views Database» more  ICDE 2005»
16 years 5 months ago
Extending Relational Database Systems to Automatically Enforce Privacy Policies
Databases are at the core of successful businesses. Due to the voluminous stores of personal data being held by companies today, preserving privacy has become a crucial requiremen...
Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry...
SACMAT
2009
ACM
15 years 11 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
FAST
2009
15 years 2 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
CN
2007
112views more  CN 2007»
15 years 4 months ago
Capacity analysis and MAC enhancement for UWB broadband wireless access networks
We analyze the capacity of ultra-wide band (UWB) wireless access networks supporting multimedia services by calculating the number of multimedia connections that can be supported ...
Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai
ER
2010
Springer
124views Database» more  ER 2010»
15 years 2 months ago
Integrity Assurance for RESTful XML
The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. REST alone and in combination with XML is fast...
Sebastian Graf, Lukas Lewandowski, Marcel Waldvoge...