Sciweavers

329 search results - page 21 / 66
» A Policy Based Role Object Model
Sort
View
VMV
2001
101views Visualization» more  VMV 2001»
13 years 10 months ago
Multiresolution Implicit Object Modeling
In this paper we discuss two image-based 3D modeling methods based on a multi-resolution evolution of a volumetric function's levelset. In the former the role of the levelset...
Augusto Sarti, Stefano Tubaro
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
JHSN
2006
267views more  JHSN 2006»
13 years 8 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
GI
1994
Springer
14 years 22 days ago
Tool-Based Business Process Modeling Using the SOM Approach
Business processes play an important role in analyzing and designing a company's behaviour and organization. Modeling business processes is an integral part of the Semantic O...
Otto K. Ferstl, Elmar J. Sinz, Michael Amberg, Udo...
DBSEC
1998
115views Database» more  DBSEC 1998»
13 years 10 months ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...