Results 1 - 10
of
413
Towards Secure Cloud Database with Fine-Grained Access Control
"... Abstract. Outsourcing data to cloud environments can offer ease of ac-cess, provisioning, and cost benefits, but makes the data more vulnerable to disclosure. Loss of complete control over the data can be offset through encryption, but this approach requires an omniscient third party key authority t ..."
Abstract
- Add to MetaCart
to handle key management, increasing overhead complexity. We present the ZeroVis framework that provides confidentiality for data stored in a cloud environment without requiring a third party key man-ager. It combines fine-grained access control with the ability to search over encrypted data to allow
Paper ID#: 901523.PDF Efficient Fine-grained Data Access Control in Wireless Sensor Networks
"... Abstract-Recent advances in distributed in-network data storage and access control have led to active research in effi-cient and robust data management in wireless sensor networks (WSNs). Although numerous schemes have been proposed this far, most of them do not provide enough attention towards expl ..."
Abstract
- Add to MetaCart
exploiting user hierarchy and sensor heterogeneity, which is quite a practical issue especially when deploying WSNs in mission-critical application scenarios. In this paper, we propose an efficient secret-key cryptography-based (SKC) fine-grained data access control scheme for securing both distributed data
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
in nature, such as different foodstuffs and liquids with various tastes. These rewards are necessary for survival, their motivational value can be determined by controlled access, and they can be delivered in quantifiable amounts in laboratory situations. The other main vegetative reward, sex, is impossible
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
goals, achieved through the implementation of tasks in rationalized, vertical chains of command and control. But for the rst time, the introduction of new information/communication technologies allows networks to keep their exibility and adaptability, thus asserting their evolutionary nature. While
Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization
"... Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from existing systems is unknown, yet empirical evidence suggests that additional fine-grained probing exposes hidden links and ..."
Abstract
-
Cited by 20 (3 self)
- Add to MetaCart
Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from existing systems is unknown, yet empirical evidence suggests that additional fine-grained probing exposes hidden links
Towards Realization of Large-Scale Botnet Probing Events
"... Abstract--- Today’s attack scenery is governed by Botnets. Botnet refer to a group of bots—a sort of malware which allows an attacker to achieve complete control over the affected computer. Botnets are often run by malicious programmers with specific skills while advanced attackers manage the contro ..."
Abstract
- Add to MetaCart
the control channel. This work is to understand the consequence of large-scale “botnet probes ” through investigating the ways to analyze collections of malicious probing traffic.In such events, a whole collection of remote hosts together probes the address space monitored by a sensor in somewhat a
Policy-based Access Control for Weakly Consistent Replication
, 2009
"... Abstract. Enforcing authorization policy for operations that read and write distributed datasets can be tricky under the simplest of circumstances. Enforcement is too often dependent on implementation specifics and on policy detail that is inextricable from the data under management. When datasets a ..."
Abstract
-
Cited by 15 (0 self)
- Add to MetaCart
inconsistencies, then permanently divergent state can result. In this paper, we describe and evaluate the design and implementation of an access-control system for weakly consistent replication where peer replicas are not uniformly trusted. Our system allows for the specification of fine-grained access control
Magnet: Robust and Efficient Collection through Control and Data Plane Integration
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract
- Add to MetaCart
. Magnet’s link estimator addresses the inaccuracies in link estimation by using feedback from both the data and control planes, using information from multiple layers through narrow, platform-independent interfaces. Second, Magnet addresses link dynamics by using the Trickle algorithm for control traffic
in press). Intellectual property protection in collaborative design through lean information modeling and sharing
- ASME J. Comp. & Inf. Sci
, 2006
"... Establishing efficient, effective, and trustworthy engineering collaboration while protecting intellectual property is vital to maintain organizational competence in today’s global business environment. In this paper, a lean information modeling and sharing framework is described to support engineer ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
purposes. The considerations of time and value-adding activity with roles, policy delegation relation in a distributed context, and fine-grained control at data set level in the model are to adhere to the general least privilege principle in access control. Heterogeneous design data are exchanged
22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract
- Add to MetaCart
are client-server based, which is feasible for relatively slow role-playing games. Those have modest bandwidth and latency requirements and are paid for by their customers. For MMOGs with higher realtime requirements and/or a smaller number of customers willing to pay, peer-to-peer networking seems to be a
Results 1 - 10
of
413