Sciweavers

12194 search results - page 106 / 2439
» cans 2010
Sort
View
AMW
2010
13 years 11 months ago
Chasing after Secrets in Relational Databases
Abstract. Inference control can guarantee confidentiality but is costly to implement. Access control can be implemented efficiently but cannot guarantee confidentiality. Hence, it ...
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan...
APVIS
2010
13 years 11 months ago
Motion track: Visualizing variations of human motion data
This paper proposes a novel visualization approach, which can depict the variations between different human motion data. This is achieved by representing the time dimension of eac...
Yueqi Hu, Shuangyuan Wu, Shihong Xia, Jinghua Fu, ...
DAIS
2010
13 years 11 months ago
Distributed Fault Tolerant Controllers
Distributed applications are often built from sets of distributed components that must be co-ordinated in order to achieve some global behaviour. The common approach is to use a c...
Leonardo Mostarda, Rudi Ball, Naranker Dulay
DBSEC
2010
129views Database» more  DBSEC 2010»
13 years 11 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
DBSEC
2010
152views Database» more  DBSEC 2010»
13 years 11 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan