Sciweavers

722 search results - page 81 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
ACSAC
2000
IEEE
15 years 4 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
ACISP
1998
Springer
15 years 4 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
ISBI
2006
IEEE
16 years 17 days ago
The Renal Physiome Project
We discuss current progress towards two complementary web resources being developed for the Renal Physiome: (1) a database (QKDB) for quantitative and anatomical data at all level...
S. Randall Thomas, Fariza Tahi, Peter Harris, Andr...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 6 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman
MFCS
2005
Springer
15 years 5 months ago
Dimension Is Compression
Abstract. Effective fractal dimension was defined by Lutz (2003) in order to quantitatively analyze the structure of complexity classes. Interesting connections of effective dim...
María López-Valdés, Elvira Ma...