Sciweavers

393 search results - page 42 / 79
» Securing Grid Data Using Mandatory Access Controls
Sort
View
MDM
2001
Springer
148views Communications» more  MDM 2001»
15 years 2 months ago
An Agent-Based Architecture Using XML for Mobile Federated Database Systems
We advocate the use of agents to model a system that allows us to integrate and protect information stored in both mobile and fixed devices, while trying to preserve a consistent a...
Carlos Sánchez, Le Gruenwald
EDBT
2006
ACM
177views Database» more  EDBT 2006»
15 years 9 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
87
Voted
TSC
2010
130views more  TSC 2010»
14 years 4 months ago
Secure Abstraction Views for Scientific Workflow Provenance Querying
bstraction Views for Scientific Workflow Provenance Querying Artem Chebotko, Member, IEEE, Shiyong Lu, Senior Member, IEEE, Seunghan Chang, Farshad Fotouhi, Member, IEEE, and Ping ...
Artem Chebotko, Shiyong Lu, Seunghan Chang, Farsha...
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
93
Voted
AIPS
2003
14 years 11 months ago
The Role of Planning in Grid Computing
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...