Sciweavers

2386 search results - page 106 / 478
» Database Security 2000
Sort
View
CONCURRENCY
2008
105views more  CONCURRENCY 2008»
14 years 10 months ago
Coordinating access control in grid services
We describe how to control the cumulative use of distributed grid resources by using coordination aware policy decision points (coordinated PDPs) and an SQL database to hold "...
David W. Chadwick, Linying Su, Romain Laborde
VLDB
1994
ACM
110views Database» more  VLDB 1994»
15 years 2 months ago
Client-Server Paradise
This paper describes the design and implementation of Paradise, a database system designed for handling GIS type of applications. The current version of Paradise, uses a client{se...
David J. DeWitt, Navin Kabra, Jun Luo, Jignesh M. ...
COMCOM
2000
97views more  COMCOM 2000»
14 years 9 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
BNCOD
2009
125views Database» more  BNCOD 2009»
14 years 7 months ago
The Adaptation Model of a Runtime Adaptable DBMS
Nowadays maintenance of database management systems (DBMSs) often requires offline operations for enhancement of functionality or security updates. This hampers the availability of...
Florian Irmert, Thomas Fischer, Frank Lauterwald, ...
PCI
2005
Springer
15 years 3 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...