Sciweavers

379 search results - page 26 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
EGC
2005
Springer
14 years 1 months ago
XDTM: The XML Data Type and Mapping for Specifying Datasets
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 2 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
SAC
2011
ACM
12 years 10 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
CHI
2006
ACM
14 years 8 months ago
Cooperative gestures: multi-user gestural interactions for co-located groupware
Multi-user, touch-sensing input devices create opportunities for the use of cooperative gestures ? multi-user gestural interactions for single display groupware. Cooperative gestu...
Meredith Ringel Morris, Anqi Huang, Andreas Paepck...