Sciweavers

1403 search results - page 107 / 281
» Security Model for XML Data
Sort
View
ISI
2005
Springer
15 years 10 months ago
Modeling and Multiway Analysis of Chatroom Tensors
This work identifies the limitations of n-way data analysis techniques in multidimensional stream data, such as Internet chatroom communications data, and establishes a link betwe...
Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. ...
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 11 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 10 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ECWEB
2001
Springer
140views ECommerce» more  ECWEB 2001»
15 years 9 months ago
A Two-Layered Integration Approach for Product Information in B2B E-commerce
Electronic B2B marketplaces bring together many online suppliers and buyers, each of which can potentially use his own format to represent the products in his product catalog. The ...
Borys Omelayenko, Dieter Fensel
GIS
2002
ACM
15 years 4 months ago
Metadata modeling in a global computing environment
Emerging computational paradigms such as global and ubiquitous computing require some rethinking and innovative research ideas in many computer science areas. In this work, we aim...
Dieter Pfoser, Evaggelia Pitoura, Nectaria Tryfona