Sciweavers

545 search results - page 96 / 109
» Modeling the tele-immersive systems using stochastic activit...
Sort
View
POLICY
2009
Springer
14 years 2 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...
TIP
2008
344views more  TIP 2008»
13 years 7 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
CCS
2003
ACM
14 years 28 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
14 years 2 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
EDOC
2009
IEEE
13 years 11 months ago
Enterprise Architecture Analysis for Data Accuracy Assessments
- Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never execute...
Per Närman, Pontus Johnson, Mathias Ekstedt, ...