Sciweavers

1663 search results - page 310 / 333
» Privacy and Identity Management
Sort
View
OOPSLA
2005
Springer
15 years 5 months ago
Fortune teller: improving garbage collection performance in server environment using live objects prediction
Currently, the most adopted criterion to invoke garbage collection is heap space exhaustion. In other words, garbage collection is invoked when the heap space (either the entire s...
Feng Xian, Witawas Srisa-an, Hong Jiang
OTM
2005
Springer
15 years 5 months ago
Middleware for Distributed Context-Aware Systems
Abstract. Context-aware systems represent extremely complex and heterogeneous distributed systems, composed of sensors, actuators, application components, and a variety of context ...
Karen Henricksen, Jadwiga Indulska, Ted McFadden, ...
CIKM
2004
Springer
15 years 5 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
ISI
2004
Springer
15 years 5 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
DRM
2003
Springer
15 years 5 months ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein