Sciweavers

366 search results - page 17 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
ACISP
1998
Springer
13 years 11 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
ESWA
2008
166views more  ESWA 2008»
13 years 7 months ago
Modular design to support green life-cycle engineering
The severe competition in the market has driven enterprises to produce a wider variety of products to meet consumers' needs. However, frequent variation of product specificat...
Hwai-En Tseng, Chien-Chen Chang, Jia-Diann Li
AI
2000
Springer
13 years 12 months ago
Keep It Simple: A Case-Base Maintenance Policy Based on Clustering and Information Theory
Abstract. Today’s case based reasoning applications face several challenges. In a typical application, the case bases grow at a very fast rate and their contents become increasin...
Qiang Yang, Jing Wu
HOTNETS
2010
13 years 2 months ago
CloudPolice: taking access control out of the network
Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, an...
Lucian Popa 0002, Minlan Yu, Steven Y. Ko, Sylvia ...
ELPUB
2007
ACM
13 years 11 months ago
Feasibility of Open Access Publishing for Journals Funded by the Social Science and Humanities Research Council of Canada
This paper reports on the results of a feasibility study on open access publishing for humanities and social sciences journals supported by the Social Sciences and Humanities Rese...
Leslie Chan, Frances Groen, Jean-Claude Gué...