Sciweavers

362 search results - page 26 / 73
» An access control model for simplifying constraint expressio...
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
A Component-Based Architecture for Secure Data Publication
We present an approach for controlling access to data publishers in the framework of Web-based information services. The paper presents a model for enforcing access control regula...
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capi...
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
OTM
2010
Springer
13 years 6 months ago
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Mark Strembeck, Jan Mendling
WFLP
2009
Springer
255views Algorithms» more  WFLP 2009»
14 years 3 days ago
Constraint Based Strategies
Numerous computational and deductive frameworks use the notion of strategy to guide reduction and search space exploration, making the macro scale control of micro operations an ex...
Claude Kirchner, Florent Kirchner, Hél&egra...
BMCBI
2006
131views more  BMCBI 2006»
13 years 7 months ago
SIMAGE: simulation of DNA-microarray gene expression data
Background: Simulation of DNA-microarray data serves at least three purposes: (i) optimizing the design of an intended DNA microarray experiment, (ii) comparing existing pre-proce...
Casper J. Albers, Ritsert C. Jansen, Jan Kok, Osca...