Sciweavers

1092 search results - page 194 / 219
» Personalized Presentation in Web-Based Information Systems
Sort
View
SIGMOD
2008
ACM
182views Database» more  SIGMOD 2008»
16 years 2 months ago
Multi-tenant databases for software as a service: schema-mapping techniques
In the implementation of hosted business services, multiple tenants are often consolidated into the same database to reduce total cost of ownership. Common practice is to map mult...
Stefan Aulbach, Torsten Grust, Dean Jacobs, Alfons...
ICSE
2005
IEEE-ACM
16 years 2 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ERCIMDL
2001
Springer
178views Education» more  ERCIMDL 2001»
15 years 6 months ago
Customizable Retrieval Functions Based on User Tasks in the Cultural Heritage Domain
The cultural heritage domain dealing with digital surrogates of rare and fragile historic artifacts is one of the most promising areas for establishing collaboratories, i.e. shared...
Holger Brocks, Ulrich Thiel, Adelheit Stein, Andre...
CCS
2007
ACM
15 years 8 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
SAC
2008
ACM
15 years 1 months ago
Digital audio watermarking evaluation within the application field of perceptual hashing
Digital watermarking is a growing research area to mark digital content by embedding information into the content itself. Perceptual hashing is used to identify a specific content...
Andreas Lang, Jana Dittmann