Sciweavers

1611 search results - page 47 / 323
» An Access Control Model for Video Database Systems
Sort
View
143
Voted
IAJIT
2010
157views more  IAJIT 2010»
15 years 2 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
163
Voted
FODO
1998
Springer
242views Algorithms» more  FODO 1998»
15 years 8 months ago
Optimizing OID Indexing Cost in Temporal Object-Oriented Database Systems
In object-oriented database systems (OODB) with logical OIDs, an OID index (OIDX) is needed to map from OID to the physical location of the object. In a transaction time temporal ...
Kjetil Nørvåg, Kjell Bratbergsengen
138
Voted
TISSEC
2010
121views more  TISSEC 2010»
15 years 2 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
141
Voted
RBAC
1997
135views more  RBAC 1997»
15 years 5 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
118
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Action-Based Access Control for Web Services
: Web services over the Internet are widely used nowadays. The problem of secure access to Web-based systems is of great importance naturally. Compared with the existing models, th...
FengHua Li, Wei Wang, Jianfeng Ma, Haoxin Su