Sciweavers

3274 search results - page 74 / 655
» Access Support in Object Bases
Sort
View
COLCOM
2009
IEEE
14 years 1 months ago
Aggregating uncertain access risk estimations from different sources invited paper
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Qun Ni, Elisa Bertino
ICDCS
2002
IEEE
14 years 2 months ago
Reasoning about Joint Administration of Access Policies for Coalition Resources
We argue that joint administration of access policies for a dynamic coalition formed by autonomous domains requires that these domains set up a coalition authority that distribute...
Himanshu Khurana, Virgil D. Gligor, John Linn
MODELS
2007
Springer
14 years 3 months ago
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
Michael Hafner, Mukhtiar Memon, Muhammad Alam
VLDB
1990
ACM
100views Database» more  VLDB 1990»
14 years 1 months ago
The C-based Database Programming Language Jasmine/C
Jasmine/C is a C-based database proqramninq language that allows the handling of persistent objects in Jasmine databases. The language is used to write methods for objects and app...
Masaaki Aoshima, Yoshio Izumida, Akifumi Makinouch...
MVA
2007
133views Computer Vision» more  MVA 2007»
13 years 10 months ago
Selection of Object Recognition Methods According to the Task and Object Category
Service robots need object recognition strategy that can work on various objects in complex backgrounds. Since no single method can work in every situation, we need to combine sev...
Al Mansur, Yoshinori Kuno