Sciweavers

370 search results - page 14 / 74
» Providing Dynamic Security Control in a Federated Database
Sort
View
ITCC
2005
IEEE
15 years 5 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
99
Voted
QRE
2010
129views more  QRE 2010»
14 years 10 months ago
Improving quality of prediction in highly dynamic environments using approximate dynamic programming
In many applications, decision making under uncertainty often involves two steps- prediction of a certain quality parameter or indicator of the system under study and the subseque...
Rajesh Ganesan, Poornima Balakrishna, Lance Sherry
FGCS
2007
90views more  FGCS 2007»
14 years 11 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
ICDIM
2007
IEEE
15 years 6 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 6 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright