Sciweavers

708 search results - page 128 / 142
» Implementing access control to people location information
Sort
View
WWW
2010
ACM
14 years 2 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
RAID
2004
Springer
14 years 1 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
GCC
2003
Springer
14 years 26 days ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
ICIP
1994
IEEE
14 years 9 months ago
A Digital Watermark
This paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capa...
Ron G. van Schyndel, Andrew Z. Tirkel, C. F. Osbor...
CIKM
2009
Springer
14 years 2 months ago
Group-by skyline query processing in relational engines
The skyline operator was first proposed in 2001 for retrieving interesting tuples from a dataset. Since then, 100+ skyline-related papers have been published; however, we discove...
Ming-Hay Luk, Man Lung Yiu, Eric Lo