Sciweavers

1795 search results - page 354 / 359
» Security Models and Information Flow
Sort
View
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 1 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
GEOS
2007
Springer
14 years 1 months ago
Spatio-temporal Conceptual Schema Development for Wide-Area Sensor Networks
Abstract. A Wide-Area Sensor Network (WASN) is a collection of heterogeneous sensor networks and data repositories spread over a wide geographic area. The diversity of sensor types...
Mallikarjun Shankar, Alexandre Sorokine, Budhendra...
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
14 years 1 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
OOPSLA
2005
Springer
14 years 1 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll
DRM
2004
Springer
14 years 29 days ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman