Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    A Research Agenda Towards Culturally Aware Information Systems

    Our world is not homogeneous in nature, it has multiple languages, ethnic groups, culture, beliefs, and varying perceptions of things. There is development towards catering experiences based on these varying d...

    Abhisek Sharma, Sarika Jain in Advances in IoT and Security with Computat… (2023)

  2. No Access

    Chapter and Conference Paper

    WIP - SKOD: A Framework for Situational Knowledge on Demand

    Extracting relevant patterns from heterogeneous data streams poses significant computational and analytical challenges. Further, identifying such patterns and pushing analogous content to interested parties ac...

    Servio Palacios, K. M. A. Solaiman in Heterogeneous Data Management, Polystores,… (2019)

  3. No Access

    Chapter and Conference Paper

    Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud

    In service-oriented architecture, services can communicate and share data amongst themselves. It is necessary to provide role-based access control for data. In addition, data leakages made by authorized insid...

    Denis Ulybyshev, Bharat Bhargava in Applications of Computing and Communicatio… (2018)

  4. No Access

    Chapter and Conference Paper

    Protecting PLM Data Throughout Their Lifecycle

    Enterprises operate in a global economy with their operations dispersed across internal processes and external partners. Product Lifecycle Management (PLM) systems play a significant role in modern product dev...

    Rohit Ranchal, Bharat Bhargava in Quality, Reliability, Security and Robustn… (2013)

  5. Chapter and Conference Paper

    A Case for Societal Digital Security Culture

    Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems ...

    Lotfi Ben Othmane, Harold Weffers in Security and Privacy Protection in Informa… (2013)

  6. No Access

    Chapter and Conference Paper

    Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection

    Recently, considerable research work have been conducted towards finding fast and accurate pattern classifiers for training Intrusion Detection Systems (IDSs). This paper proposes using the so called Fuzzy ART...

    Nelcileno Araújo, Ruy de Oliveira in Recent Trends in Computer Networks and Dis… (2012)

  7. Chapter and Conference Paper

    A Kolmogorov Complexity Approach for Measuring Attack Path Complexity

    The difficulty associated with breaching an enterprise network is commensurate with the security of that network. A security breach, or a security policy violation, occurs as a result of an attacker successful...

    Nwokedi Idika, Bharat Bhargava in Future Challenges in Security and Privacy … (2011)

  8. No Access

    Chapter and Conference Paper

    Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations

    In this paper, we report some experiments and observations to make browsing of images more adaptable using small devices. We highlight the usability of such an alternative in mobile e-commerce and bandwidthcon...

    Atul Kumar, Anjali Bhargava, Bharat Bhargava in Distributed Computing and Internet Technol… (2005)

  9. No Access

    Chapter and Conference Paper

    Vulnerabilities and Threats in Distributed Systems

    We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and threats. They are: using fault ...

    Bharat Bhargava, Leszek Lilien in Distributed Computing and Internet Technology (2005)

  10. No Access

    Chapter and Conference Paper

    E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities

    This paper presents the design of a new middleware which provides support for trust and accountability in distributed data sharing communities. One application is in the context of scientific collaborations. M...

    Paul Ruth, Dongyan Xu, Bharat Bhargava, Fred Regnier in Trust Management (2004)

  11. No Access

    Chapter and Conference Paper

    Fraud Formalization and Detection

    A fraudster can be an impersonator or a swindler. An impersonator is an illegitimate user who steals resources from the victims by “taking over” their accounts. A swindler is a legitimate user who intentionall...

    Bharat Bhargava, Yuhui Zhong, Yunhua Lu in Data Warehousing and Knowledge Discovery (2003)

  12. No Access

    Chapter and Conference Paper

    Authorization Based on Evidence and Trust*

    Develo** authorization mechanisms for secure information access by a large community of users in an open environment is challenging. Current research efforts grant privilege to a user based on her objective ...

    Bharat Bhargava, Yuhui Zhong in Data Warehousing and Knowledge Discovery (2002)

  13. No Access

    Chapter and Conference Paper

    An Algorithm for Building User-Role Profiles in a Trust Environment1

    A good direction towards building secure systems that operate efficiently in large-scale environments (like the World Wide Web) is the deployment of Role Based Access Control Methods (RBAC). RBAC architectures...

    Evimaria Terzi, Yuhui Zhong, Bharat Bhargava in Data Warehousing and Knowledge Discovery (2002)

  14. No Access

    Chapter and Conference Paper

    PartJoin:An Efficient Storage and Query Execution for Data Warehouses

    The performance of OLAP queries can be improved drastically if the warehouse data is properly selected and indexed. The problems of selecting and materializing views and indexing data have been studied extensi...

    Ladjel Bellatreche, Michel Schneider in Data Warehousing and Knowledge Discovery (2002)

  15. No Access

    Chapter

    Data and Transaction Management in a Mobile Environment

    The mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in the area of mobile databas...

    Sanjay Madria, Bharat Bhargava, Mukesh Mohania, Sourav Bhowmick in Mobile Computing (2002)

  16. No Access

    Chapter

    A Taxonomy of Data Managements Via Broadcasting in Mobile Computing

    Data management for distributed computing has spawned a variety of research work and commercial products. At the same time, recent technical advances in the development of portable computing devices and the ra...

    Ilyoung Chung, Bharat Bhargava, Sanjay K. Madria in Mobile Computing (2002)

  17. Chapter and Conference Paper

    Design and Implementation of a Python-Based Active Network Platform for Network Management and Control

    Active networks can provide lightweight solutions for network management- related tasks. Specific requirements for these tasks have to be met, while at the same time several issues crucial for active networks ...

    Florian Baumgartner, Torsten Braun, Bharat Bhargava in Active Networks (2002)

  18. No Access

    Chapter

    Tune Retrieval in the Multimedia Library

    Musical scores are traditionally retrieved by title, composer or subject classification. Just as multimedia computer systems increase the range of opportunities available for presenting musical information, so...

    Rodger J. McNab, Lloyd A. Smith, Ian H. Witten in Digital Libraries and Multimedia (2000)

  19. No Access

    Chapter and Conference Paper

    Security in Data Warehousing

    Data warehouse [2, 4, 5, 6] is an integrated repository derived from multiple source (operational and legacy) databases. The data warehouse is created by either replicating the different source data or transformi...

    Bharat Bhargava in Data Warehousing and Knowledge Discovery (2000)

  20. No Access

    Chapter and Conference Paper

    Data Organization Issues for Location-Dependent Queries in Mobile Computing

    We consider queries which originate from a mobile unit and whose result depends on the location of the user who initiates the query. Example of such a query is How many people are living in the region I am curren...

    Sanjay Kumar Madria, Bharat Bhargava in Current Issues in Databases and Informatio… (2000)

previous disabled Page of 2