Sciweavers

2272 search results - page 382 / 455
» Provable Data Privacy
Sort
View
ISI
2004
Springer
14 years 2 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
ISI
2004
Springer
14 years 2 months ago
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
Abstract. This work describes a methodology that can be used to identify structure and communication patterns within an organization based on e-mail data. The first step of the me...
Petros Drineas, Mukkai S. Krishnamoorthy, Michael ...
SDMW
2004
Springer
14 years 2 months ago
Abstracting and Refining Authorization in SQL
ing and Refining Authorization in SQL Arnon Rosenthal, Edward Sciore1 The SQL standard specifies authorization via a large set of rather opaque rules, which are difficult to unders...
Arnon Rosenthal, Edward Sciore
SPW
2004
Springer
14 years 2 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
UIST
2003
ACM
14 years 2 months ago
Rhythm modeling, visualizations and applications
People use their awareness of others' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling t...
James Begole, John C. Tang, Rosco Hill