Sciweavers

14824 search results - page 2647 / 2965
» Security - Introduction
Sort
View
PODS
1999
ACM
95views Database» more  PODS 1999»
15 years 7 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...
POPL
1999
ACM
15 years 7 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
15 years 7 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara
120
Voted
SIGMOD
1999
ACM
107views Database» more  SIGMOD 1999»
15 years 7 months ago
Client-Site Query Extensions
We explore the execution of queries with client-site userdefined functions (UDFs). Many UDFs can only be executed at the client site, for reasons of scalability, security, confide...
Tobias Mayr, Praveen Seshadri
HOTOS
1999
IEEE
15 years 7 months ago
Flexible Access Control using IPC Redirection
We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are...
Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, V...
« Prev « First page 2647 / 2965 Last » Next »