Sciweavers

769 search results - page 119 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
SAJ
2002
97views more  SAJ 2002»
14 years 10 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
TC
2008
14 years 10 months ago
eRAID: Conserving Energy in Conventional Disk-Based RAID System
Recently, high-energy consumption has become a serious concern for both storage servers and data centers. Recent research studies have utilized the short transition times of multis...
Jun Wang, Huijun Zhu, Dong Li
SOUPS
2009
ACM
15 years 5 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
EUROSYS
2011
ACM
14 years 2 months ago
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores
Buffer caches in operating systems keep active file blocks in memory to reduce disk accesses. Related studies have been focused on how to minimize buffer misses and the caused pe...
Xiaoning Ding, Kaibo Wang, Xiaodong Zhang
SIS
2007
15 years 6 days ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...