Sciweavers

5273 search results - page 180 / 1055
» Secured Web Access
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
DSS
2006
140views more  DSS 2006»
15 years 4 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 11 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
ASSETS
2004
ACM
15 years 10 months ago
Accessibility designer: visualizing usability for the blind
These days, accessibility-related regulations and guidelines have been accelerating the improvement of Web accessibility. One of the accelerating factors is the development and de...
Hironobu Takagi, Chieko Asakawa, Kentarou Fukuda, ...
KDD
2001
ACM
237views Data Mining» more  KDD 2001»
16 years 4 months ago
Exploiting Web Log Mining for Web Cache Enhancement
Abstract. Improving the performance of the Web is a crucial requirement, since its popularity resulted in a large increase in the user perceived latency. In this paper, we describe...
Alexandros Nanopoulos, Dimitrios Katsaros, Yannis ...