Sciweavers

1347 search results - page 74 / 270
» Towards a Secure Data Stream Management System
Sort
View
ESSOS
2009
Springer
14 years 2 months ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
IFIP
2001
Springer
14 years 5 days ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
COLCOM
2009
IEEE
14 years 13 days ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
GVD
2009
148views Database» more  GVD 2009»
13 years 5 months ago
Towards an Energy Aware DBMS - Energy Consumptions of Sorting and Join Algorithms
Database management systems comprise various algorithms for efficiently retrieving and managing data. Typically, algorithm efficiency or performance is correlated with execution s...
Hagen Höpfner, Christian Bunse
SACMAT
2005
ACM
14 years 1 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li