Sciweavers

3712 search results - page 496 / 743
» Role-Based Access Control
Sort
View
ICIP
2010
IEEE
15 years 2 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
MASCOTS
2010
15 years 2 months ago
Performance of Quantized Congestion Notification in TCP Incast Scenarios of Data Centers
This paper analyzes the performance of Ethernet layer congestion control mechanism Quantized Congestion Notification (QCN) during data access from clustered servers in data centers...
Prajjwal Devkota, A. L. Narasimha Reddy
USS
2010
15 years 2 months ago
Capsicum: Practical Capabilities for UNIX
Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs, providing new ke...
Robert N. M. Watson, Jonathan Anderson, Ben Laurie...
EMNLP
2009
15 years 2 months ago
Discriminative Substring Decoding for Transliteration
We present a discriminative substring decoder for transliteration. This decoder extends recent approaches for discriminative character transduction by allowing for a list of known...
Colin Cherry, Hisami Suzuki
IEEEIA
2009
15 years 2 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...