Sciweavers

263 search results - page 32 / 53
» Applying the Semantic Web Layers to Access Control
Sort
View
ICDE
2007
IEEE
166views Database» more  ICDE 2007»
14 years 3 months ago
Enforcing Context-Sensitive Policies in Collaborative Business Environments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
Alberto Sardinha, Jinghai Rao, Norman M. Sadeh
CCS
2008
ACM
13 years 11 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
VLDB
2004
ACM
106views Database» more  VLDB 2004»
14 years 2 months ago
Structures, Semantics and Statistics
At a fundamental level, the key challenge in data integration is to reconcile the semantics of disparate data sets, each expressed with a different database structure. I argue th...
Alon Y. Halevy
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
UIC
2007
Springer
14 years 3 months ago
Ontology-Based Semantic Recommendation for Context-Aware E-Learning
Nowadays, e-learning systems are widely used for education and training in universities and companies because of their electronic course content access and virtual classroom partic...
Zhiwen Yu, Yuichi Nakamura, Seiie Jang, Shoji Kaji...