• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 413
Next 10 →

Towards Secure Cloud Database with Fine-Grained Access Control

by Michael G. Solomon, Vaidy Sunderam, Li Xiong
"... Abstract. Outsourcing data to cloud environments can offer ease of ac-cess, provisioning, and cost benefits, but makes the data more vulnerable to disclosure. Loss of complete control over the data can be offset through encryption, but this approach requires an omniscient third party key authority t ..."
Abstract - Add to MetaCart
to handle key management, increasing overhead complexity. We present the ZeroVis framework that provides confidentiality for data stored in a cloud environment without requiring a third party key man-ager. It combines fine-grained access control with the ability to search over encrypted data to allow

Paper ID#: 901523.PDF Efficient Fine-grained Data Access Control in Wireless Sensor Networks

by Qian Wang, Kui Ren, Cong Wang
"... Abstract-Recent advances in distributed in-network data storage and access control have led to active research in effi-cient and robust data management in wireless sensor networks (WSNs). Although numerous schemes have been proposed this far, most of them do not provide enough attention towards expl ..."
Abstract - Add to MetaCart
exploiting user hierarchy and sensor heterogeneity, which is quite a practical issue especially when deploying WSNs in mission-critical application scenarios. In this paper, we propose an efficient secret-key cryptography-based (SKC) fine-grained data access control scheme for securing both distributed data

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
in nature, such as different foodstuffs and liquids with various tastes. These rewards are necessary for survival, their motivational value can be determined by controlled access, and they can be delivered in quantifiable amounts in laboratory situations. The other main vegetative reward, sex, is impossible

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
goals, achieved through the implementation of tasks in rationalized, vertical chains of command and control. But for the rst time, the introduction of new information/communication technologies allows networks to keep their exibility and adaptability, thus asserting their evolutionary nature. While

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization

by Robert Beverly, Arthur Berger, Geoffrey G. Xie
"... Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from existing systems is unknown, yet empirical evidence suggests that additional fine-grained probing exposes hidden links and ..."
Abstract - Cited by 20 (3 self) - Add to MetaCart
Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from existing systems is unknown, yet empirical evidence suggests that additional fine-grained probing exposes hidden links

Towards Realization of Large-Scale Botnet Probing Events

by J. Vinu, R. Rajesh Perumal
"... Abstract--- Today’s attack scenery is governed by Botnets. Botnet refer to a group of bots—a sort of malware which allows an attacker to achieve complete control over the affected computer. Botnets are often run by malicious programmers with specific skills while advanced attackers manage the contro ..."
Abstract - Add to MetaCart
the control channel. This work is to understand the consequence of large-scale “botnet probes ” through investigating the ways to analyze collections of malicious probing traffic.In such events, a whole collection of remote hosts together probes the address space monitored by a sensor in somewhat a

Policy-based Access Control for Weakly Consistent Replication

by Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry , 2009
"... Abstract. Enforcing authorization policy for operations that read and write distributed datasets can be tricky under the simplest of circumstances. Enforcement is too often dependent on implementation specifics and on policy detail that is inextricable from the data under management. When datasets a ..."
Abstract - Cited by 15 (0 self) - Add to MetaCart
inconsistencies, then permanently divergent state can result. In this paper, we describe and evaluate the design and implementation of an access-control system for weakly consistent replication where peer replicas are not uniformly trusted. Our system allows for the specification of fine-grained access control

Magnet: Robust and Efficient Collection through Control and Data Plane Integration

by unknown authors
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract - Add to MetaCart
. Magnet’s link estimator addresses the inaccuracies in link estimation by using feedback from both the data and control planes, using information from multiple layers through narrow, platform-independent interfaces. Second, Magnet addresses link dynamics by using the Trickle algorithm for control traffic

in press). Intellectual property protection in collaborative design through lean information modeling and sharing

by Yan Wang, Pamela N. Ajoku, José C. Brustoloni, Bart O. Nnaji, William Kepler, Whiteford Professor - ASME J. Comp. & Inf. Sci , 2006
"... Establishing efficient, effective, and trustworthy engineering collaboration while protecting intellectual property is vital to maintain organizational competence in today’s global business environment. In this paper, a lean information modeling and sharing framework is described to support engineer ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
purposes. The considerations of time and value-adding activity with roles, policy delegation relation in a distributed context, and fine-grained control at data set level in the model are to adhere to the general least privilege principle in access control. Heterogeneous design data are exchanged

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
are client-server based, which is feasible for relatively slow role-playing games. Those have modest bandwidth and latency requirements and are paid for by their customers. For MMOGs with higher realtime requirements and/or a smaller number of customers willing to pay, peer-to-peer networking seems to be a
Next 10 →
Results 1 - 10 of 413
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University