Sciweavers

1517 search results - page 169 / 304
» Time and Location Based Services with Access Control
Sort
View
PAKDD
2000
ACM
140views Data Mining» more  PAKDD 2000»
15 years 5 months ago
Performance Controlled Data Reduction for Knowledge Discovery in Distributed Databases
The objective of data reduction is to obtain a compact representation of a large data set to facilitate repeated use of non-redundant information with complex and slow learning alg...
Slobodan Vucetic, Zoran Obradovic
IJNSEC
2006
134views more  IJNSEC 2006»
15 years 1 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
15 years 8 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
ICPADS
1998
IEEE
15 years 6 months ago
User-Defined Telecooperation Services
A user-defined telecooperation service (UTS) provides service elements for application-specific communication and cooperation processes as well as integrated means for the service...
Volker Gruhn, Peter Herrmann, Heiko Krumm
121
Voted
TSC
2010
130views more  TSC 2010»
14 years 8 months ago
Secure Abstraction Views for Scientific Workflow Provenance Querying
bstraction Views for Scientific Workflow Provenance Querying Artem Chebotko, Member, IEEE, Shiyong Lu, Senior Member, IEEE, Seunghan Chang, Farshad Fotouhi, Member, IEEE, and Ping ...
Artem Chebotko, Shiyong Lu, Seunghan Chang, Farsha...