In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
We propose an energy-aware video streaming system for portable computing devices, in which the video can be played back for the specified duration within the remaining battery am...
Morihiko Tamai, Tao Sun, Keiichi Yasumoto, Naoki S...
Flash memory is becoming a major database storage in building embedded systems or portable devices because of its non-volatile, shock-resistant, power-economic nature, and fast acc...
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
The PolicyUpdater1 system is a fully-implemented access control system that provides policy evaluations as well as dynamic policy updates. These functions are achieved by the use o...