Sciweavers

635 search results - page 83 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 9 months ago
Rewriting Regular XPath Queries on XML Views
We study the problem of answering queries posed on virtual views of XML documents, a problem commonly encountered when enforcing XML access control and integrating data. We approa...
Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios K...
CCECE
2006
IEEE
14 years 1 months ago
A Demand-Driven Approach for a Distributed Virtual Environment
The relevance of distributed virtual environments (DVE) and interactive 3D worlds for entertaining and commercial purposes is steadily increasing. DVEs are typically implemented a...
Markus Fakler, Stefan Frenz, Michael Schöttne...
POLICY
2004
Springer
14 years 1 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
CVRMED
1997
Springer
13 years 12 months ago
An integrated remote neurosurgical system
The Neurovisualization Lab at the University of Virginia is developing the Integrated Remote Neurosurgical System (IRNS) to allow mentoring of neurosurgical procedures in remote l...
B. Sean Graves, Joe Tullio, Minyan Shi, J. Hunter ...
USENIX
2001
13 years 9 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley