Sciweavers

5386 search results - page 989 / 1078
» Approaches to Multimedia and Security
Sort
View
COMPSAC
2007
IEEE
15 years 2 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
CIKM
2009
Springer
15 years 1 months ago
A co-classification framework for detecting web spam and spammers in social media web sites
Social media are becoming increasingly popular and have attracted considerable attention from spammers. Using a sample of more than ninety thousand known spam Web sites, we found ...
Feilong Chen, Pang-Ning Tan, Anil K. Jain
ER
2009
Springer
316views Database» more  ER 2009»
15 years 1 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
ADBIS
2004
Springer
94views Database» more  ADBIS 2004»
15 years 1 months ago
Formalization and Detection of Events over a Sliding Window in Active Databases Using Interval-Based Semantics
Trend analysis and forecasting applications (e.g., securities trading, stock market, and after-the-fact diagnosis) need event detection along a moving time window. Event-driven app...
Raman Adaikkalavan, Sharma Chakravarthy
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 1 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin