Sciweavers

1618 search results - page 162 / 324
» Privacy Interfaces for Information Management
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Safety in discretionary access control for logic-based publish-subscribe systems
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter
FOSAD
2000
Springer
14 years 25 days ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
CCS
2008
ACM
13 years 11 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
ICDIM
2008
IEEE
14 years 3 months ago
English sentence retrieval system based on dependency structure and its evaluation
This paper proposes a system of retrieving English sentences by utilizing linguistically structural information. The user’s query consists of a sequence of keywords. The system ...
Yoshihide Kato, Seiji Egawa, Shigeki Matsubara, Ya...
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
13 years 1 days ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...