Sciweavers

288 search results - page 40 / 58
» Algebra and logic for access control
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
ENTCS
2006
155views more  ENTCS 2006»
13 years 7 months ago
Mathematical Service Trading Based on Equational Matching
Mathematical software libraries provide many computational services. Mathematical operators properties can be used to combine several services in order to provide more complex one...
Aurélie Hurault, Marc Pantel
ECOWS
2007
Springer
14 years 1 months ago
Specifying and Monitoring Composite Events for Semantic Web Services
Execution monitoring of complex web service process models is critical for effective management and control of web services based systems. During the composite process model execu...
Roman Vaculín, Katia P. Sycara
RSP
2003
IEEE
169views Control Systems» more  RSP 2003»
14 years 28 days ago
Rapid Prototyping and Incremental Evolution Using SLAM
The paper shows the outlines of the SLAM system and how its design is suitable for automating rapid prototyping. The system includes a very expressive object oriented specificati...
Ángel Herranz-Nieva, Juan José Moren...
CAISE
2009
Springer
13 years 11 months ago
Data-Flow Anti-patterns: Discovering Data-Flow Errors in Workflows
Despite the abundance of analysis techniques to discover control-flow errors in workflow designs, there is hardly any support for w verification. Most techniques simply abstract fr...
Nikola Trcka, Wil M. P. van der Aalst, Natalia Sid...