Sciweavers

3000 search results - page 107 / 600
» Accessing an Information System by Chatting
Sort
View
WIKIS
2010
ACM
13 years 7 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
ER
2007
Springer
95views Database» more  ER 2007»
14 years 3 months ago
Providing Semantically Equivalent, Complete Views for Multilingual Access to Integrated Data
Today, there are several approaches supporting an integrated processing of XML and (object-)relational data sources. However, each of these approaches favors a single data model f...
Iryna Kozlova, Norbert Ritter, Martin Husemann
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 3 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
JCDL
2011
ACM
260views Education» more  JCDL 2011»
13 years 15 hour ago
Extending digital repository architectures to support disk image preservation and access
Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support da...
Kam Woods, Christopher A. Lee, Simson Garfinkel
SAC
2005
ACM
14 years 2 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla