Sciweavers

565 search results - page 68 / 113
» A logic for authorization provenance
Sort
View
DOCENG
2006
ACM
14 years 2 months ago
Live editing of hypermedia documents
In some hypermedia system applications, like interactive digital TV applications, authoring and presentation of documents may have to be done concomitantly. This is the case of li...
Romualdo Monteiro de Resende Costa, Márcio ...
MIDDLEWARE
2004
Springer
14 years 2 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
ICPPW
2003
IEEE
14 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
KBSE
1998
IEEE
14 years 13 days ago
Identifying Pre-Conditions with the Z/EVES Theorem Prover
Starting from a graphical data model (a subset of the OMT object model), a skeleton of formal specification can be generated and completed to express several constraints and provi...
Yves Ledru
CJ
2004
105views more  CJ 2004»
13 years 8 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin