Sciweavers

87 search results - page 2 / 18
» Preprocessing for controlled query evaluation with availabil...
Sort
View
SDMW
2007
Springer
13 years 11 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 5 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
CCS
2005
ACM
13 years 10 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
IPMU
2010
Springer
13 years 3 months ago
Keeping Secrets in Possibilistic Knowledge Bases with Necessity-Valued Privacy Policies
Controlled Query Evaluation (CQE) is a logical framework for the protection of secrets in databases. In this article, we extend the CQE framework to possibilistic logic: knowledge ...
Lena Wiese
JSA
2010
101views more  JSA 2010»
13 years 3 months ago
Experimental evaluation of slack management in real-time control systems: Coordinated vs. self-triggered approach
Effective slack management, i.e. management of unused computing resources, for real-time control tasks mandates to redistribute the available resources between controllers as a f...
Manel Velasco, Pau Martí, Josep M. Fuertes,...