Sciweavers

88 search results - page 13 / 18
» Using Management Objectives to Specify Management Informatio...
Sort
View
IH
1998
Springer
13 years 11 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
PVLDB
2008
132views more  PVLDB 2008»
13 years 7 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne
ADBIS
2005
Springer
120views Database» more  ADBIS 2005»
14 years 1 months ago
Extensible Canonical Process Model Synthesis Applying Formal Interpretation
The current period of IT development is characterized by an explosive growth of diverse information representation languages. Applying integration and composition of heterogeneous ...
Leonid A. Kalinichenko, Sergey A. Stupnikov, Nikol...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 2 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
CCECE
2006
IEEE
14 years 1 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...