Sciweavers

1611 search results - page 45 / 323
» An Access Control Model for Video Database Systems
Sort
View
141
Voted
COMCOM
2004
98views more  COMCOM 2004»
15 years 3 months ago
Performance evaluation of a broadband wireless access system subjected to heavy load
Broadband Wireless Access (BWA) systems use new network architectures to deliver broadband services in a fixed point-to-point or pointto-multipoint configuration to residential an...
Alejandro Quintero, Yacine Elalamy, Samuel Pierre
257
Voted
ICDE
2002
IEEE
163views Database» more  ICDE 2002»
16 years 5 months ago
Keyword Searching and Browsing in Databases using BANKS
With the growth of the Web, there has been a rapid increase in the number of users who need to access online databases without having a detailed knowledge of the schema or of quer...
Gaurav Bhalotia, Arvind Hulgeri, Charuta Nakhe, So...
133
Voted
STTT
2008
134views more  STTT 2008»
15 years 3 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
130
Voted
ACMSE
2006
ACM
15 years 9 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
131
Voted
ECSCW
2001
15 years 5 months ago
Team automata for spatial access control
Abstract. Team automata provide a framework for capturing notions like coordination, colon, and cooperation in distributed systems. They consist of an abstract specification of com...
Maurice H. ter Beek, Clarence A. Ellis, Jetty Klei...