Abstract:MITRE's Evolvable Real-Time C3 (Command, Control, and Communications) project has developed an approach that would enable current real-time systems to evolve into the systems of the future. This paper first summarizes the design and implementation of an infrastructure for an evolvable real-time C3 system. Then, a detailed discussion of the infrastructure requirements for a survivable real-time C3 system is presented. Finally security issues for survivability, as well as open implementation of the infrastructur… Show more
“…We need to incorporate security into this research. For a discussion of integrating security and real-time processing for command and control systems we refer to [31].…”
Section: Quality Of Service For Multimedia Data Management Systemsmentioning
This paper describes security and privacy issues for multimedia database management systems. Multimedia data includes text, images, audio and video. It describes access control for multimedia database management systems and describes security policies and security architectures for such systems. Privacy problems that result from multimedia data mining are also discussed.
“…We need to incorporate security into this research. For a discussion of integrating security and real-time processing for command and control systems we refer to [31].…”
Section: Quality Of Service For Multimedia Data Management Systemsmentioning
This paper describes security and privacy issues for multimedia database management systems. Multimedia data includes text, images, audio and video. It describes access control for multimedia database management systems and describes security policies and security architectures for such systems. Privacy problems that result from multimedia data mining are also discussed.
“…We used object technology for integrating the various components. We also showed how such an infrastructure could be used to migrate legacy applications (see [3], [25]). …”
Section: Secure Dependable Information Managementmentioning
Abstract:This paper first describes the developments in data and applications security with a special emphasis on database security. It also discusses current work including security for data warehouses and e-commerce systems. Then it discuses some of the directions for data and applications security which includes secure semantic web, secure dependable information management, and secure sensor information management. Directions for privacy research are also given.
“…H 4 is visited twice but H 1 is selected as the parent since H 4 is visited from H 1 first and there is no need for adjustment when it is visited the second time. From the clusters nearest to S, the clusters that are two hops away from S, including H 10 , H 11 , H 12 , H 13 , H 14 , and H 15 , are visited. Finally, the nodes that are further away from S are visited.…”
Section: A Heuristic Algorithm For the Oirspmentioning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.