Sciweavers

2458 search results - page 403 / 492
» Database-Management Principles And Applications
Sort
View
PODS
2000
ACM
112views Database» more  PODS 2000»
15 years 2 months ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
FM
1999
Springer
111views Formal Methods» more  FM 1999»
15 years 2 months ago
Developing BON as an Industrial-Strength Formal Method
Abstract. The emerging Unified Modelling Language has been touted as merging the best features of existing modelling languages, and has been adopted by leading companies and vendo...
Richard F. Paige, Jonathan S. Ostroff
TPHOL
1999
IEEE
15 years 2 months ago
Isar - A Generic Interpretative Approach to Readable Formal Proof Documents
Abstract. We present a generic approach to readable formal proof documents, called Intelligible semi-automated reasoning (Isar). It addresses the major problem of existing interact...
Markus Wenzel
WECWIS
1999
IEEE
102views ECommerce» more  WECWIS 1999»
15 years 2 months ago
Monitoring and Prediction of Network Performance
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...
Bjorn Frogner, Alexander B. Cannara