Sciweavers

872 search results - page 108 / 175
» An Access Control Language for a General Provenance Model
Sort
View
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 2 months ago
Cross-Layer Optimization With Model-Based Parameter Exchange
— Cross-layer optimization (CLO) promises significant gains in comparison to a conventional system design, which does not allow for information exchange across layers. One of th...
Andreas Saul, Shoaib Khan, Gunther Auer, Wolfgang ...
ICAIL
2007
ACM
13 years 11 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
POLICY
2007
Springer
14 years 1 months ago
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructure for complex resource provisioning (CRP) in Grid-based applica...
Yuri Demchenko, Leon Gommans, Cees de Laat
CLEF
2008
Springer
13 years 9 months ago
The Domain-Specific Track at CLEF 2008
The domain-specific track evaluates retrieval models for structured scientific bibliographic collections in English, German and Russian. Documents contain elements (title, abstrac...
Vivien Petras, Stefan Baerisch
FAC
2008
92views more  FAC 2008»
13 years 7 months ago
Capture-avoiding substitution as a nominal algebra
Substitution is fundamental to the theory of logic and computation. Is substitution something that we define on syntax on a case-by-case basis, or can we turn the idea of substitut...
Murdoch James Gabbay, Aad Mathijssen