Sciweavers

186 search results - page 2 / 38
» Efficient Access Control for Composite Applications
Sort
View
CCS
2008
ACM
13 years 7 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
COMPSAC
2006
IEEE
13 years 11 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
JOT
2006
119views more  JOT 2006»
13 years 5 months ago
An efficient multiversion access control in a Temporal Object Oriented Database
Many data base applications require the storage and manipulation of different versions of data objects. To satisfy the diverse needs of these applications, current database system...
Gurusamy Arumugam, Muthuraman Thangaraj
ISI
2004
Springer
13 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
WCNC
2008
IEEE
13 years 11 months ago
On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks
Abstract— In wireless sensor networks, one of the big challenges is to achieve a satisfactory network lifetime while meeting quality of service (QoS) requirements. In this paper,...
Zhiwen Wan, Jinsong Zhang, Hao Zhu, Kia Makki, Nik...