Sciweavers

1611 search results - page 45 / 323
» An Access Control Model for Video Database Systems
Sort
View
COMCOM
2004
98views more  COMCOM 2004»
14 years 9 months ago
Performance evaluation of a broadband wireless access system subjected to heavy load
Broadband Wireless Access (BWA) systems use new network architectures to deliver broadband services in a fixed point-to-point or pointto-multipoint configuration to residential an...
Alejandro Quintero, Yacine Elalamy, Samuel Pierre
ICDE
2002
IEEE
163views Database» more  ICDE 2002»
15 years 11 months ago
Keyword Searching and Browsing in Databases using BANKS
With the growth of the Web, there has been a rapid increase in the number of users who need to access online databases without having a detailed knowledge of the schema or of quer...
Gaurav Bhalotia, Arvind Hulgeri, Charuta Nakhe, So...
STTT
2008
134views more  STTT 2008»
14 years 9 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
ACMSE
2006
ACM
15 years 3 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
ECSCW
2001
14 years 11 months ago
Team automata for spatial access control
Abstract. Team automata provide a framework for capturing notions like coordination, colon, and cooperation in distributed systems. They consist of an abstract specification of com...
Maurice H. ter Beek, Clarence A. Ellis, Jetty Klei...