Sciweavers

1323 search results - page 75 / 265
» Updatable Security Views
Sort
View
COMPSEC
2002
92views more  COMPSEC 2002»
15 years 2 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
ISOTAS
1993
15 years 6 months ago
Maintaining Behavioral Consistency during Schema Evolution
We examine the problem of how to ensure behavioral consistency of an object-oriented system after its schema has been updated. The problem is viewed from the perspective of both t...
Paul L. Bergstein, Walter L. Hürsch
IJCAI
1997
15 years 3 months ago
The Self-Organizing Desk
The self-organizing desk is a system that enhances a physical desk-top with electronic information. It can remember, organize, update, and manipulate the information contained in ...
Daniela Rus, Peter de Santis
IAJIT
2010
133views more  IAJIT 2010»
15 years 1 months ago
Mediation Queries Adaptation After the Removal of a Data Source
: A broad variety of data is available in distinct heterogeneous sources, stored under different formats: database formats (in relational and object-oriented models), document form...
Latifa Baba-hamed
SP
2008
IEEE
15 years 8 months ago
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P′ , automatically generate an exploit for the potentially unknow...
David Brumley, Pongsin Poosankam, Dawn Xiaodong So...