Sciweavers

1611 search results - page 135 / 323
» An Access Control Model for Video Database Systems
Sort
View
CIKM
1994
Springer
15 years 8 months ago
Analytical Version Control Management in a Hypertext System
may be saved for later reuse of material, but also to preserve the historical perspective of work done [ha:92]. In particular, in distributed and collaborative hypertext systems, v...
Antonina Dattolo, Antonio Gisolfi
178
Voted
SACMAT
2009
ACM
15 years 10 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
140
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
PODS
1997
ACM
72views Database» more  PODS 1997»
15 years 8 months ago
OLAP and Statistical Databases: Similarities and Differences
During the 1980's there was a lot of activity in the area of Statistical Databases, focusing mostly on socio-economic type applications, such as census data, national product...
Arie Shoshani
146
Voted
WINET
2010
121views more  WINET 2010»
15 years 2 months ago
Transmission algorithm for video streaming over cellular networks
2.5G and 3G cellular networks are becoming more and more widespread. Therefore, the need for value added services is increasing rapidly. One of the key services that operators see...
Y. Falik, A. Averbuch, U. Yechiali