Sciweavers

1457 search results - page 83 / 292
» Privacy Challenges for Database Systems
Sort
View
104
Voted
COMPSAC
2004
IEEE
15 years 7 months ago
Materializing Ubiquitous Computing Environments
A key challenge in ubiquitous computing is how to manage ambient information about the environment where a variety of devices appear. Traditional capability descriptions are inadeq...
Kimio Kuramitsu, Hideyuki Tokuda
127
Voted
BIB
2008
109views more  BIB 2008»
15 years 3 months ago
Computational intelligence approaches for pattern discovery in biological systems
Biology, chemistry and medicine are faced by tremendous challenges caused by an overwhelming amount of data and the need for rapid interpretation. Computational intelligence (CI) ...
Gary B. Fogel
104
Voted
CCS
2007
ACM
15 years 9 months ago
Administration in role-based access control
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify s...
Ninghui Li, Ziqing Mao
127
Voted
ACSAC
1998
IEEE
15 years 7 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer
PET
2010
Springer
15 years 7 months ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...