Results 1 - 10
of
233
Modeling And Inferring On Role-Based Access Control Policies Using Data Dependencies
"... Abstract. Role-Based Access Control (RBAC) models are becoming a de facto standard, greatly simplifying management and administration tasks. Organizational constraints were introduced (e.g.: mutually exclusive roles, cardinality, prerequisite roles) to reflect peculiarities of organizations. Thus, t ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. Role-Based Access Control (RBAC) models are becoming a de facto standard, greatly simplifying management and administration tasks. Organizational constraints were introduced (e.g.: mutually exclusive roles, cardinality, prerequisite roles) to reflect peculiarities of organizations. Thus
Identification and inference in nonlinear difference-in-difference models
- ECONOMETRICA
, 2005
"... This paper develops a generalization of the widely used Difference-In-Difference (DID) method for evaluating the effects of policy changes. We propose a model that allows the control group and treatment groups to have different average benefits from the treatment. The assumptions of the proposed mod ..."
Abstract
-
Cited by 84 (1 self)
- Add to MetaCart
This paper develops a generalization of the widely used Difference-In-Difference (DID) method for evaluating the effects of policy changes. We propose a model that allows the control group and treatment groups to have different average benefits from the treatment. The assumptions of the proposed
Party over Policy: The Dominating Impact of Group Influence
- on Political Beliefs.’’ Journal of Personality and Social Psychology
, 2003
"... Four studies demonstrated both the power of group influence in persuasion and people's blindness to it. Even under conditions of effortful processing, attitudes toward a social policy depended almost exclusively upon the stated position of one's political party. This effect overwhelmed th ..."
Abstract
-
Cited by 86 (7 self)
- Add to MetaCart
policy (M ϭ 3.20), t(46) ϭ 3.92, p Ͻ .001. Neither analysis yielded main effects or interactions involving participant knowledge, all Fs Ͻ 2. (Using participant knowledge as a continuous variable in a regression model yielded the same null result, all Fs Ͻ 1.) Self-Perceived Bases of Attitudes
Secure XML Querying with Security Views
, 2004
"... The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing sensitive information to unauthorized users. This paper introduces a novel paradigm for specifying XML security constrain ..."
Abstract
-
Cited by 98 (10 self)
- Add to MetaCart
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing sensitive information to unauthorized users. This paper introduces a novel paradigm for specifying XML security
Protection of Data Base Security via Collaborative Inference Detection
"... Abstract:-Throughout companies, government departments, and doctors ’ offices, database systems are used. This particular system stores and retrieves sensitive information such as social security numbers, financial statements, and highly classified data. Organizations with sensitive data in their ha ..."
Abstract
- Add to MetaCart
in their hands need to be secured using different security techniques and policies. In order to secure the data on a computer, they need to implement techniques like access control, auditing, authentication, encryption, etc; however, malicious users are still breaking into companies ’ data. Needless to say
Shrinkage Estimators for Robust and Efficient Inference in Haplotype-Based Case-Control Studies
"... Case-control association studies often aim to investigate the role of genes and geneenvironment interactions in terms of the underlying haplotypes, i.e. the combinations of alleles at multiple genetic loci along chromosomal regions. The goal of this article is to develop robust but efficient approac ..."
Abstract
-
Cited by 18 (3 self)
- Add to MetaCart
retrospective estimator towards a more precise, but model-dependent, retrospective estimator using novel empirical Bayes and penalized regression techniques. Methods for variance estimation are proposed based on asymptotic theories. Simulations and two data examples illustrate both the robustness and efficiency
Author manuscript, published in "WWW (Companion Volume) (2012) 211-214" The ERC Webdam on Foundations of Web Data Management ∗
, 2012
"... The Webdam ERC grant is a five-year project that started in December 2008. The goal is to develop a formal model for Web data management that would open new horizons for the development of the Web in a well-principled way, enhancing its functionality, performance, and reliability. Specifically, the ..."
Abstract
- Add to MetaCart
The Webdam ERC grant is a five-year project that started in December 2008. The goal is to develop a formal model for Web data management that would open new horizons for the development of the Web in a well-principled way, enhancing its functionality, performance, and reliability. Specifically
Database Security Protection via Inference Detection
- IEEE International Conference on Intelligence and Security Informatics
, 2006
"... Abstract. Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and infer sensitive information from a series of seemingly innocuous data access. In this paper, we proposed a detec ..."
Abstract
-
Cited by 8 (2 self)
- Add to MetaCart
Abstract. Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and infer sensitive information from a series of seemingly innocuous data access. In this paper, we proposed a
Magnet: Robust and Efficient Collection through Control and Data Plane Integration
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract
- Add to MetaCart
. Magnet’s link estimator addresses the inaccuracies in link estimation by using feedback from both the data and control planes, using information from multiple layers through narrow, platform-independent interfaces. Second, Magnet addresses link dynamics by using the Trickle algorithm for control traffic
Brief Announcement: Extending SQL Access Control to Derived and Distributed Data
"... Access-control mechanisms in distributed systems can differ greatly. For example, a data warehouse materializes a separate database; the underlying source administrators then grant full privileges on their contributed data to the warehouse administrator, trusting that he will grant appropriate privi ..."
Abstract
- Add to MetaCart
privileges on the warehouse data. On the other hand, federated database researchers have source and federation administrators collaborating to specify the rights of federation users. Research papers have proposed access-control models specifically for federations, distributed-object systems, XML systems, etc
Results 1 - 10
of
233