Sciweavers

5252 search results - page 911 / 1051
» Logic in Access Control
Sort
View
SIGKDD
2008
107views more  SIGKDD 2008»
15 years 4 months ago
A privacy-aware trajectory tracking query engine
Advances in telecommunications and GPS sensors technology have made possible the collection of data like time series of locations, related to the movement of individuals. The anal...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
SIGOPS
2008
156views more  SIGOPS 2008»
15 years 4 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
IJIEM
2007
113views more  IJIEM 2007»
15 years 4 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
IJNSEC
2007
139views more  IJNSEC 2007»
15 years 4 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
157
Voted
IJWGS
2007
96views more  IJWGS 2007»
15 years 4 months ago
The many faces of the integration of instruments and the grid
: Current grid technologies offer unlimited computational power and storage capacity for scientific research and business activities in heterogeneous areas all over the world. Than...
Francesco Lelli, Eric Frizziero, Michele Gulmini, ...