Sciweavers

751 search results - page 47 / 151
» A Dialogue Manager for Accessing Databases
Sort
View
CCS
2007
ACM
15 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
USS
2010
14 years 7 months ago
Baaz: A System for Detecting Access Control Misconfigurations
Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
GRID
2006
Springer
14 years 9 months ago
Grid Deployment of Legacy Bioinformatics Applications with Transparent Data Access
Although grid computing offers great potential for executing large-scale bioinformatics applications, practical deployment is constrained by legacy interfaces. Most widely deployed...
Christophe Blanchet, Rémi Mollon, Douglas T...
ELPUB
2008
ACM
14 years 11 months ago
The IDRC Digital Library: an open access institutional repository disseminating the research results of developing world researc
The International Development Research Centre (IDRC) has recently launched the OAI-PMH compliant IDRC Digital Library (IDL), a DSpace institutional repository. The digital library...
Barbara Porrett
ICETE
2004
204views Business» more  ICETE 2004»
14 years 11 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson