Sciweavers

769 search results - page 106 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
80
Voted
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 3 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...
90
Voted
HUC
2003
Springer
15 years 4 months ago
liquid: Context-Aware Distributed Queries
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...
TNC
2004
132views Education» more  TNC 2004»
15 years 8 days ago
Distributed Encoding Environment based on Grids and IBP Infrastructure
This paper introduces an environment for distributed video transcoding based on Grid computing infrastructure and Internet Backplane Protocol storage infrastructure. A model for s...
Petr Holub, Lukás Hejtmánek
CCS
2007
ACM
15 years 5 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
123
Voted
SACMAT
2009
ACM
15 years 5 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri