Sciweavers

3121 search results - page 559 / 625
» Information Survivability Control Systems
Sort
View
129
Voted
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 7 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...
COST
1994
Springer
159views Multimedia» more  COST 1994»
15 years 7 months ago
A Mail-Based Teleservice Architecture for Archiving and Retrieving Dynamically Composable Multimedia Documents
In this paper, a teleservice for archiving and retrieving multimedia documents using public networks is described. This teleservice encourages a broad range of commercially applic...
Heiko Thimm, Katja Röhr, Thomas C. Rakow
102
Voted
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 7 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
158
Voted
FORMATS
2007
Springer
15 years 7 months ago
Partial Order Reduction for Verification of Real-Time Components
Abstract. We describe a partial order reduction technique for a realtime component model. Components are described as timed automata with data ports, which can be composed in stati...
John Håkansson, Paul Pettersson
CCS
2004
ACM
15 years 7 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger