Sciweavers

1457 search results - page 101 / 292
» Privacy Challenges for Database Systems
Sort
View
110
Voted
ICPR
2004
IEEE
16 years 4 months ago
Face Verification System Architecture Using Smart Cards
A smart card based face verification system is proposed in which the feature extraction and decision making is performed on the card. Such an architecture has many privacy and sec...
Josef Kittler, Kieron Messer, Thirimachos Bourlai
112
Voted
ICAIL
2007
ACM
15 years 5 months ago
P2P systems in legal networks: another "small world" case
The “small world”-paradigm offers a new interesting viewpoint for the analysis of contemporary legal networks and artificial intelligence. This topological approach sheds fu...
Ugo Pagallo, Giancarlo Ruffo
207
Voted
EDBT
2012
ACM
395views Database» more  EDBT 2012»
13 years 6 months ago
Data management with SAPs in-memory computing engine
We present some architectural and technological insights on SAP’s HANA database and derive research challenges for future enterprise application development. The HANA database m...
Joos-Hendrik Boese, Cafer Tosun, Christian Mathis,...
230
Voted
GIS
2008
ACM
16 years 4 months ago
A location aware role and attribute based access control system
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
140
Voted
IEEEARES
2010
IEEE
15 years 10 months ago
Analysing and Visualising Security and Usability in IRIS
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
Shamal Faily, Ivan Flechais