Sciweavers

422 search results - page 80 / 85
» Risk management for distributed authorization
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
CCS
2007
ACM
15 years 3 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
87
Voted
ISLPED
2006
ACM
109views Hardware» more  ISLPED 2006»
15 years 3 months ago
Power reduction of multiple disks using dynamic cache resizing and speed control
This paper presents an energy-conservation method for multiple disks and their cache memory. Our method periodically resizes the cache memory and controls the rotation speeds unde...
Le Cai, Yung-Hsiang Lu
SIGIR
2005
ACM
15 years 3 months ago
A probabilistic model for retrospective news event detection
Retrospective news event detection (RED) is defined as the discovery of previously unidentified events in historical news corpus. Although both the contents and time information...
Zhiwei Li, Bin Wang, Mingjing Li, Wei-Ying Ma
CIKM
2004
Springer
15 years 2 months ago
Hierarchical document categorization with support vector machines
Automatically categorizing documents into pre-defined topic hierarchies or taxonomies is a crucial step in knowledge and content management. Standard machine learning techniques ...
Lijuan Cai, Thomas Hofmann