Sciweavers

2386 search results - page 348 / 478
» Database Security 2000
Sort
View
STORAGESS
2006
ACM
15 years 4 months ago
The case for semantic aware remote replication
This paper argues that the network latency due to synchronous replication is no longer tolerable in scenarios where businesses are required by regulation to separate their seconda...
Xiaotao Liu, Gal Niv, Prashant J. Shenoy, K. K. Ra...
ESCIENCE
2005
IEEE
15 years 3 months ago
Grid-Enabling an Existing Instrument-Based National Service
Recent work by the ‘CombeChem’ project together with the UK National Crystallography Service (NCS) has integrated the NCS into an e-Science environment. The existing high-thro...
Jeremy G. Frey, Sam Peppe, Mike Surridge, Ken Meac...
SACMAT
2005
ACM
15 years 3 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
15 years 3 months ago
Evaluation of Biometric Identification in Open Systems
This paper concerns the generalizability of biometric identification results from small-sized closed systems to larger open systems. Many researchers have claimed high identificati...
Michael Gibbons, Sungsoo Yoon, Sung-Hyuk Cha, Char...
PET
2004
Springer
15 years 3 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...