Sciweavers

1323 search results - page 75 / 265
» Updatable Security Views
Sort
View
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 10 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
ISOTAS
1993
14 years 2 months ago
Maintaining Behavioral Consistency during Schema Evolution
We examine the problem of how to ensure behavioral consistency of an object-oriented system after its schema has been updated. The problem is viewed from the perspective of both t...
Paul L. Bergstein, Walter L. Hürsch
IJCAI
1997
13 years 11 months ago
The Self-Organizing Desk
The self-organizing desk is a system that enhances a physical desk-top with electronic information. It can remember, organize, update, and manipulate the information contained in ...
Daniela Rus, Peter de Santis
IAJIT
2010
133views more  IAJIT 2010»
13 years 8 months ago
Mediation Queries Adaptation After the Removal of a Data Source
: A broad variety of data is available in distinct heterogeneous sources, stored under different formats: database formats (in relational and object-oriented models), document form...
Latifa Baba-hamed
SP
2008
IEEE
14 years 4 months ago
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P′ , automatically generate an exploit for the potentially unknow...
David Brumley, Pongsin Poosankam, Dawn Xiaodong So...