Sciweavers

872 search results - page 37 / 175
» An Access Control Language for a General Provenance Model
Sort
View
ECIS
2000
15 years 5 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
SPIN
1999
Springer
15 years 8 months ago
Model Checking for Managers
Model checking is traditionally applied to computer system design. It has proven to be a valuable technique. However, it requires detailed specifications of systems and requirement...
Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fen...
139
Voted
ENTCS
2007
174views more  ENTCS 2007»
15 years 4 months ago
Quantum Patterns and Types for Entanglement and Separability
As a first step toward a notion of quantum data structures, we introduce a typing system for reflecting entanglement and separability. This is presented in the context of classi...
Simon Perdrix
MMMACNS
2010
Springer
15 years 2 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
KI
2007
Springer
15 years 10 months ago
Proposal of Generalized Rule Programming Model
Abstract. Rule-based programming paradigm is omnipresent in number of engineering domains. However, there are some fundamental semantical differences between it, and classic progr...
Grzegorz J. Nalepa, Igor Wojnicki