Sciweavers

852 search results - page 146 / 171
» Model-Checking Access Control Policies
Sort
View
ICDCS
2005
IEEE
14 years 2 months ago
An Update Protocol for XML Documents in Distributed and Cooperative Systems
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ens...
Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elen...
ISM
2005
IEEE
169views Multimedia» more  ISM 2005»
14 years 2 months ago
A Framework to Improve QoS and Mobility Management for Multimedia Applications in the IMS
The new IP Multimedia Subsystem (IMS) provides an overlay architecture for IP based core networks and enables the efficient provision of an open set of potentially highly integrat...
Fabricio Carvalho de Gouveia, Thomas Magedanz
VIZSEC
2005
Springer
14 years 2 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
ITCC
2002
IEEE
14 years 1 months ago
Performance of KDB-Trees with Query-Based Splitting
While the persistent data of many advanced database applications, such as OLAP and scientific studies, are characterized by very high dimensionality, typical queries posed on thes...
Yves Lépouchard, John L. Pfaltz, Ratko Orla...
SIGUCCS
2000
ACM
14 years 11 days ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman