Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Security (2)
- Access Control (1)
- Access level (1)
- Access rights (1)
- Active learning (1)
-
- Applied sciences (1)
- CFAA (1)
- Cloud computing (1)
- Computer Crime (1)
- Computer Fraud and Abuse Act (1)
- Computer security (1)
- Cost-sensitive learning (1)
- Cybercrime (1)
- Data protection (1)
- Data security (1)
- Deterrence (1)
- Document database (1)
- Information systems (1)
- MIS security (1)
- Malicious URL detection (1)
- Management Information Systems (1)
- Management information system (1)
- NoSQL (1)
- Online learning (1)
- RBAC (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Databases and Information Systems
An Access Control Model For Nosql Databases, Motahera Shermin
An Access Control Model For Nosql Databases, Motahera Shermin
Electronic Thesis and Dissertation Repository
Current development platforms are web scale, unlike recent platforms which were just network scale. There has been a rapid evolution in computing paradigm that has created the need for data storage as agile and scalable as the applications they support. Relational databases with their joins and locks influence performance in web scale systems negatively. Thus, various types of non-relational databases have emerged in recent years, commonly referred to as NoSQL databases. To fulfill the gaps created by their relational counter-part, they trade consistency and security for performance and scalability. With NoSQL databases being adopted by an increasing number of organizations, …
A Robust Rgbd Slam System For 3d Environment With Planar Surfaces, Po-Chang Su, Ju Shen, Sen-Ching S. Cheung
A Robust Rgbd Slam System For 3d Environment With Planar Surfaces, Po-Chang Su, Ju Shen, Sen-Ching S. Cheung
Computer Science Faculty Publications
With the increasing popularity of RGB-depth (RGB-D) sensors such as the Microsoft Kinect, there have been much research on capturing and reconstructing 3D environments using a movable RGB-D sensor. The key process behind these kinds of simultaneous location and mapping (SLAM) systems is the iterative closest point or ICP algorithm, which is an iterative algorithm that can estimate the rigid movement of the camera based on the captured 3D point clouds. While ICP is a well-studied algorithm, it is problematic when it is used in scanning large planar regions such as wall surfaces in a room. The lack of depth …
How To Implement Access Rights In An Mis Project, Umakant Mishra
How To Implement Access Rights In An Mis Project, Umakant Mishra
Umakant Mishra
The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …
Cost-Sensitive Online Active Learning With Application To Malicious Url Detection, Peilin Zhao, Steven C. H. Hoi
Cost-Sensitive Online Active Learning With Application To Malicious Url Detection, Peilin Zhao, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Malicious Uniform Resource Locator (URL) detection is an important problem in web search and mining, which plays a critical role in internet security. In literature, many existing studies have attempted to formulate the problem as a regular supervised binary classification task, which typically aims to optimize the prediction accuracy. However, in a real-world malicious URL detection task, the ratio between the number of malicious URLs and legitimate URLs is highly imbalanced, making it very inappropriate for simply optimizing the prediction accuracy. Besides, another key limitation of the existing work is to assume a large amount of training data is available, …
A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand
A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand
Graduate Theses and Dissertations
Cloud computing has gained a lot of importance and has been one of the most discussed segment of today's IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is …
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Articles
Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.
At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …