Sciweavers

518 search results - page 40 / 104
» Abstract Interpretation-Based Protection
Sort
View
JUCS
2010
155views more  JUCS 2010»
14 years 8 months ago
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
Abstract: Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of...
Raju Halder, Shantanu Pal, Agostino Cortesi
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
16 years 2 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
RTSS
2009
IEEE
15 years 8 months ago
On the Scheduling of Mixed-Criticality Real-Time Task Sets
Abstract—The functional consolidation induced by the costreduction trends in embedded systems can force tasks of different criticality (e.g. ABS Brakes with DVD) to share a proce...
Dionisio de Niz, Karthik Lakshmanan, Ragunathan Ra...
SACMAT
2005
ACM
15 years 7 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
CCS
2006
ACM
15 years 5 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...