Sciweavers

5252 search results - page 882 / 1051
» Logic in Access Control
Sort
View
CL
2000
Springer
15 years 8 months ago
Promoting Constraints to First-Class Status
Abstract. This paper proposes to promote constraints to first-class status. In contrast to constraint propagation, which performs inference on values of variables, first-class co...
Tobias Müller
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
15 years 8 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
MOBICOM
1999
ACM
15 years 8 months ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins
PODS
1999
ACM
95views Database» more  PODS 1999»
15 years 8 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...
HPDC
1999
IEEE
15 years 8 months ago
Resource Co-Allocation in Computational Grids
Applications designed to execute on "computational grids" frequently require the simultaneous co-allocation of multiple resources in order to meet performance requiremen...
Karl Czajkowski, Ian T. Foster, Carl Kesselman