Sciweavers

1906 search results - page 173 / 382
» Data Privacy
Sort
View
150
Voted
SDMW
2009
Springer
15 years 10 months ago
Controlling Access to XML Documents over XML Native and Relational Databases
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We de...
Lazaros Koromilas, George Chinis, Irini Fundulaki,...
104
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
On the Possibility of Small, Service-Free Disk Based Storage Systems
For many storage providers, the cost of providing service calls exceeds the costs of the hardware being serviced. In this paper, we show that zeromaintenance, small disk arrays ar...
Jehan-François Pâris, Thomas J. E. Sc...
IEEEARES
2008
IEEE
15 years 10 months ago
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set
In this work, AdaBoost and C4.5, are employed for classifying Skype direct (UDP and TCP) communications from traffic log files. Pre-processing is applied to the traffic data to ex...
Duffy Angevine, A. Nur Zincir-Heywood
124
Voted
CCS
2007
ACM
15 years 9 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
135
Voted
TRUSTBUS
2007
Springer
15 years 9 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty