Sciweavers

427 search results - page 73 / 86
» Implementing Real-Time Update of Access Control Policies
Sort
View
122
Voted
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 4 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
98
Voted
VLDB
1997
ACM
109views Database» more  VLDB 1997»
15 years 4 months ago
Logical and Physical Versioning in Main Memory Databases
We present a design for multi-version concurrency control and recovery in a main memory database, and describe logical and physical versioning schemes that allow read-only transac...
Rajeev Rastogi, S. Seshadri, Philip Bohannon, Denn...
WETICE
2003
IEEE
15 years 5 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deļ¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
ACSAC
2001
IEEE
15 years 4 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
111
Voted
NDSS
2002
IEEE
15 years 5 months ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...