Sciweavers

872 search results - page 37 / 175
» An Access Control Language for a General Provenance Model
Sort
View
ECIS
2000
13 years 9 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
SPIN
1999
Springer
13 years 12 months ago
Model Checking for Managers
Model checking is traditionally applied to computer system design. It has proven to be a valuable technique. However, it requires detailed specifications of systems and requirement...
Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fen...
ENTCS
2007
174views more  ENTCS 2007»
13 years 7 months ago
Quantum Patterns and Types for Entanglement and Separability
As a first step toward a notion of quantum data structures, we introduce a typing system for reflecting entanglement and separability. This is presented in the context of classi...
Simon Perdrix
MMMACNS
2010
Springer
13 years 6 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
KI
2007
Springer
14 years 1 months ago
Proposal of Generalized Rule Programming Model
Abstract. Rule-based programming paradigm is omnipresent in number of engineering domains. However, there are some fundamental semantical differences between it, and classic progr...
Grzegorz J. Nalepa, Igor Wojnicki