Overview. Database Security. Relational Database Basics. Semantic Integrity Controls. Access Control Rules- Name dependent access
|
|
|
- Marylou Edwards
- 10 years ago
- Views:
Transcription
1 Database ecurity ione FischerHübner Applied ecurity, DAVC7 Overview eantic Integrity Controls Access Control Rules Multilevel ecure Databases RBAC in Coercial DBM tatistical Database ecurity Relational Database Basics A Relational Database is perceived as a collection o tables/relations John ith Prograer IT ecurity specialist ecretary A priary key is a unique and inial identiier or the tuples within a relation (e.g., eployee nae) eantic Integrity Controls Monitor: nit o DBM that checks value being entered to ensure consistency with rest o the database characteristics o the particular ield Entity Integrity Rule: No coponent o the priary key ay accept a null value (no entry). eantic Integrity Controls (II) Fors o Monitor checks: Range coparison: check that values are within acceptable range days in January: 3 salary o eployees < Access Control Rules Nae dependent access Nae dependent: based on object nae/id (e.g. nae o relations/tables, attributes) Can be enorced by underlying O tate constraints: describe conditions or entire database all eployees have dierent eployee nubers only one eployee is president Transition constraints: conditions necessary beore changes to be applied eployee who is arried cannot becoe single Alice Bob Exaple: Eployee Table R,W Course Table R R
2 Content dependent Access Contentdependent: based on object content Ipleentation: contentbased views, query odiication Exaple: Contentbased View DEFINE VIEW X (Eployeeno, salary) A ELECT Eployeeno, salary Fro Eployee WHERE ALARY < Contentdependent Access (II) Exaple: Query Modiication DENY (Nae, ALARY) WHERE ALARY > FIND alary WHERE Nae = ith > (is odiied to) FIND alary WHERE Nae = ith AND T alary > Contextdependent Access Contextdependent: based on syste variables such as data, tie, query source contextbased views Exaple: alary inoration can only be updated at the end o the year Multilevel ecure Databases Ipleent Bell LaPadula s Mandatory ( MultiLevel ) ecurity policy in a relational database First prototype in the eaview (ecure data VIEW) project (988) Major database vendors have DBM versions with ultilevel database security support (e.g. Trusted Oracle) Multilevel ecure Databases tructure Multilevel ecure Databases Exaple Labeling Objects: R: ultilevel relation with n attributes A tuple in R is o the or (v, c,, v n, c n, t c ) where v i : ith attribute value c i : security level o the ith ield (not visible to users) t c : security level o the tuple (not visible) Exaple: C nae C Dept Dept Virus prograer IT ecurity specialist ecretary C pro T : unclassiied : ecret T: Top ecret (For siplicity, we only consider the security classiication parts o the security level in this and in the ollowing exaples) tc T
3 Multilevel ecure Databases Instances Multilevel ecure Databses Instances (II) CInstance o a relation: Inoration in relation accessible by users at classiication C. Values not accessible are replaced by null values (no entry). Instance: Exaples: Instance: ecretary Dept IT ecurity specialist ecretary Consistent Addressing In order to address a data ite, you have to speciy a database D a relation R within D a priary key or a tuple r within D the attribute i, identiying eleent r i within r To get through to eleent r i, the ollowing ust hold: O (D) O (R) O (r i ) ( O : object security level) ince a user who has access to a tuple r has also access to all its eleents O (r i ) O (r) is required Multilevel Entity Integrity No tuples in an instance o R have null values or any o the priary key attributes All coponents o a priary key o a relation R have the sae security level, which is doinated by the security levels o all nonkey attributes Polyinstantiation Polyinstantiation: everal tuples ight exist or the sae priary key Polyinstantiated eleents: Eleents o an attribute which have dierent security levels, but are associated with the sae priary key and key security level Proble: Tradeo between conidentiality (covert channel protection) and integrity Polyinstantiation (II) How do polyinstantiated eleents arise? A subject updates what appears a null eleent in a tuple, but which actually hides data with a higher (or incoparable) security level Proble: ubject cannot be inored about existence o higher security level data (> covert channel) Overwriting the old value allows low users to unwittingly destroy high data Insertion ust be accepted 3
4 Polyinstantiation Exaple Polyinstantiation Exaple (cont.) Instance o our Exaple Database: ecretary C nae Dept C Dept Virus Prograer IT ecurity specialist ecretary C pro T tc T Priary key: Eployee Nae nclassiied ubject requests the ollowing operation: pdate eployee ET proession = Prograer WHERE nae = C nae Dept C Dept Virus Prograer IT ecurity specialist Prograer ecretary C pro T tc T nique Identiication RBAC Features in Coercial DBM Extended priary key: Priary key + security levels o all ields in a tuple needed or a unique identiication o tuples Ability or a role grantee to grant that role to other users Multiple active roles or a user session peciy a deault active role set or a user session Build a role hierarchy Feature peciy static separation o duty constraints on roles peciy dynaic separation o duty constraints on roles peciy axiu or iniu cardinality or role ebership Grant DBM yste Privileges to a role GRANT DBM Object Privileges to a role Inorix () ybase Oracle tatistical Database ecurity tatistical Database: Inoration is retrieved by eans o statistical queries on an attribute (colun) o a table Attributes directly identiying persons (e.g., naes, personal nubers) are usually not allowed or statistical queries Record No tatistical Database Exaple Nae Mayer ith neyer Hall Bob Fisher Knuth ilver Cohn veniek ex Age Major C C C C C GP 3 Nae: identity data (identiying the persons) ex, Age, Major: deographic data (generally known to any people) GP(student grades): analysis data (not publicly known, o interest or attackers)
5 tatistical Queries tatistical query: q(c,) (or siply: q(c)) q: statistical unction C: characteristic orula, logical orula over the values o attributes using the operators OR, AND, T : subset o attributes Exaple: CONT (( EX = MALE ) AND ( MAJOR = C )) M(( EX = MALE ) AND ( MAJOR = C ), GP) query set (C) = set o records whose values atch a characteristic orula C ALL = orula whose query set is the entire database iple Attacks all Query et Attacks: Attacker knows that ith is a eale C student: CONT (( EX = FEMALE ) AND ( MAJOR = C )) = => ith is the only eale C student. M(( EX = FEMALE ) AND ( MAJOR = C ), GP) = ith s GP = iple Attacks (II) Large Query et Attacks: It is not suicient to suppress only sall query sets! The sae statistics can be calculated by: CONT(ALL) CONT(T ((EX = FEMALE) AND (MAJOR = C))) = M(ALL, GP) M(T((EX = FEMALE) AND (MAJOR = C)),GP) = Query et ize Control A statistic q(c) is peritted only i n query set (C) Nn or paraeter n, N: size (No. o tuples) o database q(all) can be coputed ro: q (All) = q (C) + q (T C) or C with n query set (C) Nn However: Tracker attacks can still coproise security! Individual Tracker Attack Individual Tracker: uppose: q (C) is rejected, because query set (C) = C = C AND C, n query set (C) N n n query set (C AND T C) N n Individual Tracker: { C, C AND T C} Individual Tracker Attack: (or q : M or CONT)) q(c) = q(c AND C) = q(c) q (C AND T C) Individual Tracker Attack (II) Venn Diagra: C C x z y C= C AND C q(c) = x + z = q(c AND T C) + q(c) => q(c) = q(c AND C) = q(c) q (C AND T C) 5
6 Individual Tracker Exaple Exaple: n =, Individual Tracker = { (Major = C), (Major = C) AND T (EX = ))} M((Major = C) AND (ex = ),GP) = M (Major = C, GP) M ((Major = C) AND T (ex = ), GP) = 0 = A new Individual Tracker has to be ound or each person! General Tracker Attack General Tracker: Characteristic Forula T such that *n query set (T) N *n, n N/ General Tracker Attack: q(all) = q(t) + q(not T) I query set (C) < n: q(c) = q(c or T) + q(c or not T) q(all) General Tracker Attack (II) VennDiagra: T not T C w x not C y z q(all) = w + x + y + z = q(t) + q(not T) q(c or T) + q(c or not T) = (w+x+y) + (w+x+z) = (w+x) + (w+x+y+z) = q(c) + q(all) => q(c) = q(c or T) + q(c or not T) q(all) General Tracker Attack Exaple Exaple: n =, T = (ex= Male) M ((EX = FEMALE) AND (MAJOR = C), GP) = M((EX = FEMALE) AND (MAJOR = C)) OR (EX = MALE),GP) + M (((EX = FEMALE) AND (MAJOR = C)) OR (T (EX = MALE)), GP) M (ALL, GP) = = M (ALL, GP) = M (EX = MALE, GP) + M (T (EX = MALE), GP) Inerence Controls ecurity Controls or tatistical Databases: Data Pertubation (slightly odiies data values in database) Output Controls Output Modiication (odiies statistics, adds sall relative errors to outputs, e.g, rounding, adding rando nubers) Output election (rejects sensitive statistics, e.g. query set size control, axiu order control) Exercise Find a General Tracker Individual Tracker to coproise Mayer s GP (see exaple DB above) 6
Fuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,
A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
A quantum secret ballot. Abstract
A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy
Searching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University
Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship
Implementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
Performance Evaluation of Machine Learning Techniques using Software Cost Drivers
Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise
Data Set Generation for Rectangular Placement Problems
Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George
To identify entities and their relationships. To describe entities using attributes, multivalued attributes, derived attributes, and key attributes.
CHAPTER 3 Database Design Objectives To use ER odeling to odel data. To identify entities and their relationships. To describe entities using attributes, ultivalued attributes, derived attributes, and
INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS
Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE
Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013
Calculation Method for evaluating Solar Assisted Heat Pup Systes in SAP 2009 15 July 2013 Page 1 of 17 1 Introduction This docuent describes how Solar Assisted Heat Pup Systes are recognised in the National
Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises
Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:
Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA
Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without
An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration
International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration
Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected].
Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected] 937-775-5119 Goals of DB Security Integrity: Only authorized users should be
Presentation Safety Legislation and Standards
levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety
Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
An Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
Important Compliance Information. How to obtain and use the new documents (if fillable PDF s are mentioned above)
Copliance This Copliance is being sent to infor you that one or ore of the docuents currently contained in your Wolters Kluwer Financial Services Bankers Systes software syste or electronic docuents odule
Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
Partitioned Elias-Fano Indexes
Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa [email protected] Rossano Venturini Dept. of Coputer Science, University of Pisa [email protected] ABSTRACT The Elias-ano
Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
The Virtual Spring Mass System
The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a
Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that
Online Appendix I: A Model of Household Bargaining ith Violence In this appendix I develop a siple odel of household bargaining that incorporates violence and shos under hat assuptions an increase in oen
Halloween Costume Ideas for the Wii Game
Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin
Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates
National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE
SAMPLING METHODS LEARNING OBJECTIVES
6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of
Amplifiers and Superlatives
Aplifiers and Superlatives An Exaination of Aerican Clais for Iproving Linearity and Efficiency By D. T. N. WILLIAMSON and P. J. WALKE ecent articles, particularly in the United States, have shown that
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
Physics 211: Lab Oscillations. Simple Harmonic Motion.
Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.
Managing Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
COMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES
COMBINING CRASH RECORDER AND AIRED COMARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMACTS WITH SECIAL REFERENCE TO NECK INJURIES Anders Kullgren, Maria Krafft Folksa Research, 66 Stockhol,
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]
Claim form for a motor vehicle/motorcycle accident
Clai or or a otor vehicle/otorcycle accident To be copleted by ENNIA advisor policy. custoer. agent nae agent. nae advisor advisor. phone advisor phone agent clai. Policyholder private individual aily
Chapter 14 Oscillations
Chapter 4 Oscillations Conceptual Probles 3 n object attached to a spring exhibits siple haronic otion with an aplitude o 4. c. When the object is. c ro the equilibriu position, what percentage o its total
The Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
Method of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
EUROMAP 46.1. Extrusion Blow Moulding Machines Determination of Machine Related Energy Efficiency Class. Version 1.0, January 2014 13 pages
EUROMAP 46.1 Extrusion Blow Moulding Machines Deterination of Machine Related Energy Efficiency Class Version 1.0, January 2014 13 pages This recoendation was prepared by the Technical Coission of EUROMAP.
Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
Lecture L9 - Linear Impulse and Momentum. Collisions
J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,
PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Converters
Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Conerters Yang Qiu, Ming Xu, Jinjun Liu, and Fred C. Lee Center for Power Electroni Systes The Bradley Departent of Electrical
Online Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
A Fast Algorithm for Online Placement and Reorganization of Replicated Data
A Fast Algorith for Online Placeent and Reorganization of Replicated Data R. J. Honicky Storage Systes Research Center University of California, Santa Cruz Ethan L. Miller Storage Systes Research Center
ADJUSTING FOR QUALITY CHANGE
ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes
The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs
Send Orders for Reprints to [email protected] 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic
HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:
HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]
Meadowlark Optics LCPM-3000 Liquid Crystal Polarimeter Application Note: Determination of Retardance by Polarimetry Tommy Drouillard
Meadowlark Optics LCPM- Liquid Crystal Polarieter Application Note: Deterination of Retardance by Polarietry Toy Drouillard 5 Meadowlark Optics, Inc.. Introduction: The iediate purpose of a polarieter
Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index
Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa
Energy Proportionality for Disk Storage Using Replication
Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy
Preference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]
Polyinstantiation in Relational Databases with Multilevel Security
Polyinstantiation in Relational Databases with Multilevel Security Andro Galinovi King ICT d.o.o., Buzinski prilaz 10, 10010 Zagreb, Croatia E-mail: [email protected] Vlatka Anton i University
Information Processing Letters
Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul
Uses Crows feet notation for ER Diagrams in ERwin
ER odel Overview Entity types Attributes, keys Relationship types Weak entity types EER odel Outline Subclasses Specialization/Generalization Schea Design Single DB View integration in IS Uses Crows feet
Quality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
arxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
Markovian inventory policy with application to the paper industry
Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2
Local Area Network Management
Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area
Database Security Part 7
Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino [email protected] Discretionary Access Control (DAC) No precise definition Widely used in modern operating
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu [email protected] Departent of Coputer
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
The Fundamentals of Modal Testing
The Fundaentals of Modal Testing Application Note 243-3 Η(ω) = Σ n r=1 φ φ i j / 2 2 2 2 ( ω n - ω ) + (2ξωωn) Preface Modal analysis is defined as the study of the dynaic characteristics of a echanical
Real Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
Investing in corporate bonds?
Investing in corporate bonds? This independent guide fro the Australian Securities and Investents Coission (ASIC) can help you look past the return and assess the risks of corporate bonds. If you re thinking
On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics
The Mathematics of Pumping Water
The Matheatics of Puping Water AECOM Design Build Civil, Mechanical Engineering INTRODUCTION Please observe the conversion of units in calculations throughout this exeplar. In any puping syste, the role
5.7 Chebyshev Multi-section Matching Transformer
/9/ 5_7 Chebyshev Multisection Matching Transforers / 5.7 Chebyshev Multi-section Matching Transforer Reading Assignent: pp. 5-55 We can also build a ultisection atching network such that Γ f is a Chebyshev
Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization
Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico
How To Get A Loan From A Bank For Free
Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,
The Velocities of Gas Molecules
he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes
