Sciweavers

1949 search results - page 142 / 390
» Protective Interface Specifications
Sort
View
ESORICS
1994
Springer
15 years 5 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
AAAI
2006
15 years 3 months ago
Monitoring Food Safety by Detecting Patterns in Consumer Complaints
EPFC (Emerging Patterns in Food Complaints) is the analytical component of the Consumer Complaint Monitoring System, designed to help the food safety officials to efficiently and ...
Artur Dubrawski, Kimberly Elenberg, Andrew W. Moor...
ISI
2006
Springer
15 years 1 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
105
Voted
TCSV
2008
140views more  TCSV 2008»
15 years 1 months ago
Face-Based Digital Signatures for Video Retrieval
The characterization of a video segment by a digital signature is a fundamental task in video processing. It is necessary for video indexing and retrieval, copyright protection and...
Costas I. Cotsaces, Nikos Nikolaidis, Ioannis Pita...
113
Voted
CCS
2006
ACM
15 years 5 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...