Sciweavers

1147 search results - page 15 / 230
» Transformation of Access Rights
Sort
View
SRDS
2006
IEEE
14 years 2 months ago
Cryptree: A Folder Tree Structure for Cryptographic File Systems
We present Cryptree, a cryptographic tree structure which facilitates access control in file systems operating on untrusted storage. Cryptree leverages the file system’s folde...
Dominik Grolimund, Luzius Meisser, Stefan Schmid, ...
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 2 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
APPML
2010
112views more  APPML 2010»
13 years 8 months ago
Computing Fourier transforms and convolutions of Sn-1-invariant signals on Sn in time linear in n
Let Sn denote the symmetric group on {1, . . . , n} and Sn-1 the stabilizer subgroup of n. We derive algorithms for computing Fourier transforms of left and right Sn-1-invariant s...
Michael Clausen, Ramakrishna Kakarala
DM
2008
102views more  DM 2008»
13 years 8 months ago
Largest subsemigroups of the full transformation monoid
In this paper we are concerned with the following question: for a semigroup S, what is the largest size of a subsemigroup T S where T has a given property? The semigroups S that w...
R. Gray, J. D. Mitchell
AUTOMATICA
2004
91views more  AUTOMATICA 2004»
13 years 8 months ago
Comparing digital implementation via the bilinear and step-invariant transformations
From an analog system K, digital systems Kd and Kbt are often obtained via the step-invariant and bilinear transformations, respectively. For the case when K is stable, it is show...
Guofeng Zhang, Tongwen Chen