Sciweavers

6555 search results - page 1186 / 1311
» Secure attribute-based systems
Sort
View
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 2 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
16 years 2 months ago
Exchanging Intensional XML Data
XML is becoming the universal format for data exchange between applications. Recently, the emergence of Web services as standard means of publishing and accessing data on the Web ...
Tova Milo, Serge Abiteboul, Bernd Amann, Omar Benj...
105
Voted
ICSE
2004
IEEE-ACM
16 years 2 months ago
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions
A holy grail of component-based software engineering is "write-once, reuse everywhere". However, in modern distributed, component-based systems supporting emerging appli...
Eric Wohlstadter, Stefan Tai, Thomas A. Mikalsen, ...
ICSE
2005
IEEE-ACM
16 years 2 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski
113
Voted
PERCOM
2008
ACM
16 years 2 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
« Prev « First page 1186 / 1311 Last » Next »