Sciweavers

264 search results - page 16 / 53
» View security as the basis for data warehouse security
Sort
View
ECUMN
2007
Springer
14 years 2 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
KSEM
2010
Springer
13 years 6 months ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...
PERVASIVE
2006
Springer
13 years 8 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
VIZSEC
2005
Springer
14 years 2 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
KES
2007
Springer
14 years 2 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu