Sciweavers

1347 search results - page 149 / 270
» Towards a Secure Data Stream Management System
Sort
View
CCS
2009
ACM
16 years 5 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
CCS
2007
ACM
15 years 10 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
SACMAT
2006
ACM
15 years 10 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
TMC
2011
164views more  TMC 2011»
14 years 11 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
NETWORK
2007
87views more  NETWORK 2007»
15 years 4 months ago
Resource Management for Broadband Access over Time-Division Multiplexed Passive Optical Networks
Passive optical networks are a prominent broadband access solution to tackle the “last mile” bottleneck in telecommunications infrastructure. Data transmission over standardiz...
Yuanqiu Luo, Si Yin, Nirwan Anson, Ting Wang