Sciweavers

2386 search results - page 248 / 478
» Database Security 2000
Sort
View
NAR
2000
109views more  NAR 2000»
14 years 10 months ago
The ASTRAL compendium for protein structure and sequence analysis
The ASTRAL compendium provides several databases and tools to aid in the analysis of protein structures, particularly through the use of their sequences. The SPACI scores included...
Steven E. Brenner, Patrice Koehl, Michael Levitt
SACMAT
2003
ACM
15 years 4 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
ACSAC
2000
IEEE
15 years 3 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
ACSAC
2000
IEEE
15 years 3 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
15 years 3 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...