Sciweavers

263 search results - page 15 / 53
» Applying the Semantic Web Layers to Access Control
Sort
View
STTT
2008
134views more  STTT 2008»
13 years 9 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
WS
2008
ACM
13 years 9 months ago
ActiveRDF: Embedding Semantic Web data into object-oriented languages
Semantic Web applications share a large portion of development effort with database-driven Web applications. Existing approaches for development of these database-driven applicati...
Eyal Oren, Benjamin Heitmann, Stefan Decker
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 9 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
PERCOM
2005
ACM
14 years 8 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
LWA
2004
13 years 10 months ago
The Personal Reader: A Framework for Enabling Personalization Services on the Semantic Web
The Personal Reader1 provides a framework for designing, implementing and maintaining web content readers, which provide personalized enrichment of web content for each individual...
Nicola Henze, Marc Herrlich