Sciweavers

635 search results - page 72 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
ICDE
1999
IEEE
106views Database» more  ICDE 1999»
14 years 9 months ago
Processing Operations with Restrictions in RDBMS without External Sorting: The Tetris Algorithm
Most operations of the relational algebra or SQL require a sorted stream of tuples for efficient processing. Therefore, processing complex relational queries relies on efficient a...
Volker Markl, Martin Zirkel, Rudolf Bayer
VRML
1998
ACM
13 years 12 months ago
Using VRML as an Interface to the 3D Data Warehouse
In its current state, VRML does not provide support for interaction and on-line access to databases, even though these are two fundamental issues for business applications. We hav...
Volker Coors, Volker Jung
ESSOS
2010
Springer
14 years 4 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
ICPP
2003
IEEE
14 years 1 months ago
Accurately Modeling Workload Interactions for Deploying Prefetching in Web Servers
Although Web prefetching is regarded as an effective method to improve client access performance, the associated overhead prevents it from being widely deployed. Specifically, a ...
Xin Chen, Xiaodong Zhang
ICSE
2007
IEEE-ACM
14 years 7 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...