Sciweavers

465 search results - page 61 / 93
» Supporting Architectural Restructuring by Analyzing Feature ...
Sort
View
EDBT
2004
ACM
108views Database» more  EDBT 2004»
15 years 12 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
ICCSA
2009
Springer
15 years 6 months ago
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
Abstract. The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-le...
Sergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca
SAC
2011
ACM
14 years 2 months ago
ImageAlert: credibility analysis of text-image pairs on the web
Although the Web lets users freely browse and publish information, most Web information is unauthorized in contrast to conventional mass media. Therefore, it is not always credibl...
Yusuke Yamamoto, Katsumi Tanaka
MSWIM
2005
ACM
15 years 5 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
ICSE
2005
IEEE-ACM
15 years 12 months ago
Process issues in course projects
Defined software engineering process help teaching and guiding software engineering courses projects. However, using them raises several issues related to process and course featu...
Wilson P. Paula Filho