As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...
Network firewalls and routers use a rule database to decide which packets will be allowed from one network onto another. By filtering packets the firewalls and routers can improve...
This paper proposes a system which eases the job of entering and sharing expert analysis on a database system, with emphasis to pictorial and document information. With this syste...