Sciweavers

807 search results - page 55 / 162
» Term Rewriting for Access Control
Sort
View
156
Voted
ER
2010
Springer
164views Database» more  ER 2010»
15 years 1 months ago
Querying Databases with Taxonomies
Traditional information search in which queries are posed against a known and rigid schema over a structured database is shifting towards a Web scenario in which exposed schemas ar...
Davide Martinenghi, Riccardo Torlone
WIOPT
2010
IEEE
15 years 1 months ago
Extra back-off flow control in wireless mesh networks
Abstract--CSMA is the predominant distributed access protocol for wireless mesh networks. Originally designed for singlehop settings, in multi-hop networks CSMA can exhibit severe ...
Ton Hellings, Johan van Leeuwaarden, Sem C. Borst,...
MM
2004
ACM
106views Multimedia» more  MM 2004»
15 years 9 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
SIGCOMM
2010
ACM
15 years 3 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
IPPS
2000
IEEE
15 years 8 months ago
Controlling Distributed Shared Memory Consistency from High Level Programming Languages
One of the keys for the success of parallel processing is the availability of high-level programming languages for on-the-shelf parallel architectures. Using explicit message passi...
Yvon Jégou