Sciweavers

270 search results - page 6 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
NOMS
2000
IEEE
118views Communications» more  NOMS 2000»
13 years 12 months ago
On the enhancement of a differentiated services scheme
Simple Integrated Media Access (SIMA) is a differentiated service scheme based on drop preference bits in every packet. The basic idea of the SIMA is to maximize the exploitation ...
Runtong Zhang, Jian Ma
SAC
2000
ACM
13 years 11 months ago
Efficient and Flexible Web Access to Art-Historical Image Collections
Modern object-relational database systems are capable of managing multimedia data, e.g. image, video and audio. In this paper we study how such universal database systems can be u...
Matthias Wagner, Stefan Holland, Werner Kieß...
PVLDB
2010
111views more  PVLDB 2010»
13 years 2 months ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
CSFW
2004
IEEE
13 years 11 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...