Sciweavers

3712 search results - page 481 / 743
» Role-Based Access Control
Sort
View
132
Voted
VLDB
1990
ACM
126views Database» more  VLDB 1990»
15 years 9 months ago
Consistency of Versions in Object-Oriented Databases
This paper presents an approach to maintaining consistency of object versions in multiversion database systems. In this approach a multiversion database is considered to be a set ...
Wojciech Cellary, Geneviève Jomier
COMPSAC
2009
IEEE
15 years 8 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
DAWAK
2009
Springer
15 years 8 months ago
Skyline View: Efficient Distributed Subspace Skyline Computation
Skyline queries have gained much attention as alternative query semantics with pros (e.g.low query formulation overhead) and cons (e.g.large control over result size). To overcome ...
Jinhan Kim, Jongwuk Lee, Seung-won Hwang
ICC
2007
IEEE
15 years 8 months ago
Towards an Integrated Design Approach to Specknets
The Research Consortium in Speckled Computing is a multidisciplinary grouping of computer scientists, electronic engineers, physicists and electrochemists with the aim of realising...
D. K. Arvind, K. Elgaid, T. Krauss, A. Paterson, R...
ACSAC
2004
IEEE
15 years 8 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe