Sciweavers

2009 search results - page 293 / 402
» A privacy-aware access control system
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 2 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
VLDB
1993
ACM
113views Database» more  VLDB 1993»
14 years 2 months ago
An Active Object-Oriented Database: A Multi-Paradigm Approach to Constraint Management
Mb describe the design and implementation of a constraint management facility for our active object-oriented database system called Jasmine/A. The facility includes integrity cons...
Hiroshi Ishikawa, Kazumi Kubota
APWEB
2006
Springer
14 years 1 months ago
Efficient Dynamic Traffic Navigation with Hierarchical Aggregation Tree
Nowadays, the rapid advances in wireless communications, positioning techniques and mobile devices enable location based service such as dynamic traffic navigation. Yet, it is a ch...
Yun Bai, Yanyan Guo, Xiaofeng Meng, Tao Wan, Karin...
ETRICS
2006
14 years 1 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
ASPDAC
2001
ACM
112views Hardware» more  ASPDAC 2001»
14 years 1 months ago
Parameterized MAC unit implementation
Ethernet communication devices, such as adapter, hub, bridge and switch, all follow IEEE 802.3 standard protocol. We have designed and implemented an integrated 10/100 Mbps Etherne...
Ming-Chih Chen, Ing-Jer Huang, Chung-Ho Chen