Sciweavers

650 search results - page 102 / 130
» Privacy in Non-private Environments
Sort
View
OOPSLA
2005
Springer
14 years 2 months ago
Demand-driven points-to analysis for Java
We present a points-to analysis technique suitable for environments with small time and memory budgets, such as just-in-time (JIT) compilers and interactive development environmen...
Manu Sridharan, Denis Gopan, Lexin Shan, Rastislav...
ACISP
1997
Springer
14 years 24 days ago
Enabling Technology for the Trading of MPEG-encoded Video
tracts, pp. 11-17. (http://www.qucis.queens.ca/achallc97/papers/p028.html) Alexa, Melina; Rostek, Lothar Pattern Concordances - TATOE calls XGrammar. Presented at ACH -ALLC97, King...
Jana Dittmann, Arnd Steinmetz
IEEEARES
2010
IEEE
14 years 3 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
CCS
2010
ACM
14 years 3 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
ACSAC
2009
IEEE
14 years 3 months ago
Scalable Web Content Attestation
—The web is a primary means of information sharing for most organizations and people. Currently, a recipient of web content knows nothing about the environment in which that info...
Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman...