Sciweavers

448 search results - page 11 / 90
» Who is in Control
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 5 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
15 years 9 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon
CIKM
2001
Springer
15 years 8 months ago
Exploiting A Controlled Vocabulary to Improve Collection Selection and Retrieval Effectiveness
Vocabulary incompatibilities arise when the terms used to index a document collection are largely unknown, or at least not well-known to the users who eventually search the collec...
James C. French, Allison L. Powell, Fredric C. Gey...
ICRA
1994
IEEE
154views Robotics» more  ICRA 1994»
15 years 8 months ago
The Network Data Delivery Service: Real-Time Data Connectivity for Distributed Control Applications
The Network Data Delivery Service NDDS is a novel network data-sharing system. NDDS builds on the model of information producers sources and consumers sinks. Producers generate da...
Gerardo Pardo-Castellote, Stanley A. Schneider
ICISC
2007
134views Cryptology» more  ICISC 2007»
15 years 5 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim