Sciweavers

151 search results - page 23 / 31
» On Testing for Absence of Rights in Access Control Models
Sort
View
WWW
2004
ACM
14 years 8 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
RBAC
2000
129views more  RBAC 2000»
13 years 8 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann
RTSS
2007
IEEE
14 years 1 months ago
Chronos: Feedback Control of a Real Database System Performance
It is challenging to process transactions in a timely fashion using fresh data, e.g., current stock prices, since database workloads may considerably vary due to dynamic data/reso...
Kyoung-Don Kang, Jisu Oh, Sang Hyuk Son
BMCBI
2007
146views more  BMCBI 2007»
13 years 7 months ago
PubMed related articles: a probabilistic topic-based model for content similarity
Background: We present a probabilistic topic-based model for content similarity called pmra that underlies the related article search feature in PubMed. Whether or not a document ...
Jimmy J. Lin, W. John Wilbur
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
13 years 11 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser