Sciweavers

653 search results - page 70 / 131
» Addressing interoperability issues in access control models
Sort
View
IS
2012
12 years 3 months ago
On the refactoring of activity labels in business process models
Large corporations increasingly utilize business process models for documenting and redesigning their operations. The extent of such modeling initiatives with several hundred mode...
Henrik Leopold, Sergey Smirnov 0002, Jan Mendling
DSN
2011
IEEE
12 years 7 months ago
Modeling time correlation in passive network loss tomography
—We consider the problem of inferring link loss rates using passive measurements. Prior inference approaches are mainly built on the time correlation nature of packet losses. How...
Jin Cao, Aiyou Chen, Patrick P. C. Lee
WSC
1998
13 years 9 months ago
Applying Temporal Databases to HLA Data Collection and Analysis
The High Level Architecture (HLA) for distributed simulations was proposed by the Defense Modeling and Simulation Office of the Department of Defense (DOD) in order to support int...
Thom McLean, Leo Mark, Margaret L. Loper, David Ro...
BDA
1998
13 years 9 months ago
Methods and views
Many papers have been written on the structural aspect of view mechanisms for object-oriented databases. A clean model that focuses speci cally on the interplay between methods an...
Jan Van den Bussche, Emmanuel Waller
SACMAT
2009
ACM
14 years 22 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...