Sciweavers

48 search results - page 5 / 10
» his 2001
Sort
View
DBSEC
2001
154views Database» more  DBSEC 2001»
13 years 9 months ago
Regulating Access to XML documents
In this paper, our objective is to define a security model for regulating access to XML documents. Our model offers a security policy with a great expressive power. An XML documen...
Alban Gabillon, Emmanuel Bruno
AICCSA
2001
IEEE
81views Hardware» more  AICCSA 2001»
13 years 11 months ago
Connectionist Approach for Website Visitors Behaviors Mining
In this paper, we propose a new version of the topological maps algorithm, which has been used to cluster web site visitors. These are characterized by partially redundant variabl...
Khalid Benabdeslem, Younès Bennani, Eric Ja...
ASIACRYPT
2001
Springer
14 years 13 hour ago
Known-IV Attacks on Triple Modes of Operation of Block Ciphers
With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-...
Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee...
GI
2001
Springer
13 years 12 months ago
A Simple Key Distribution Method for IEEE 802.11 Encryption Keys
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...
Günter Schäfer, Michael Eyrich
ICCS
2001
Springer
13 years 12 months ago
Reverse Pivoting in Conceptual Information Systems
Abstract. In database marketing, the behavior of customers is analyzed by studying the transactions they have performed. In order to get a global picture of the behavior of a custo...
Joachim Hereth Correia, Gerd Stumme