Sciweavers

316 search results - page 28 / 64
» Variations in Access Control Logic
Sort
View
IPCCC
2005
IEEE
14 years 1 months ago
Utilizing characteristics of last link to improve TCP performance
TCP, perhaps the most widely used transport protocol, was designed for wired links and stationary hosts. But more and more links with different characteristics are used to access...
Xiuchao Wu, I. Biswas, Mun Choon Chan, Akkihebbal ...
STORAGESS
2005
ACM
14 years 1 months ago
Key management for multi-user encrypted databases
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service (DAS), where an organization’s database is stored at an external s...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ADC
2004
Springer
87views Database» more  ADC 2004»
14 years 1 months ago
On the Computation of Approximations of Database Queries
Reflective Relational Machines were introduced by S. Abiteboul, C. Papadimitriou and V. Vianu in 1994, as variations of Turing machines which are suitable for the computation of ...
Flavio Antonio Ferrarotti, Jose Maria Turull Torre...
ICLP
2011
Springer
12 years 11 months ago
Minimizing the overheads of dependent {AND}-parallelism
Parallel implementations of programming languages need to control synchronization overheads. Synchronization is essential for ensuring the correctness of parallel code, yet it add...
Peter Wang, Zoltan Somogyi