Sciweavers

3320 search results - page 51 / 664
» Accessibility of the Database Literature
Sort
View
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
15 years 11 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
CIKM
2004
Springer
15 years 4 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
VLDB
1994
ACM
130views Database» more  VLDB 1994»
15 years 3 months ago
Experiments on Access to Digital Libraries: How can Images and Text be Used Together
Should digital libraries be based on image or text display? Which will serve users better? Experience and experiments show that users can employ either, and that there are technic...
Michael Lesk
CORR
2000
Springer
100views Education» more  CORR 2000»
14 years 11 months ago
Algorithms for Analysing Firewall and Router Access Lists
Network firewalls and routers use a rule database to decide which packets will be allowed from one network onto another. By filtering packets the firewalls and routers can improve...
Scott Hazelhurst
BMCBI
2008
130views more  BMCBI 2008»
14 years 11 months ago
Gene Prospector: An evidence gateway for evaluating potential susceptibility genes and interacting risk factors for human diseas
Background: Millions of single nucleotide polymorphisms have been identified as a result of the human genome project and the rapid advance of high throughput genotyping technology...
Wei Yu, Anja Wulf, Tiebin Liu, Muin J. Khoury, Mar...