Sciweavers

263 search results - page 42 / 53
» Applying the Semantic Web Layers to Access Control
Sort
View
PDPTA
2004
13 years 10 months ago
Service Oriented Web Based Meta Resource Sharing Platform - The CBWeB Portal
Grid computing and cluster computing platforms are becoming the primary development platforms for pervasive computing. The primary problem associated with both computational grids...
Avinash Shankar, Daniel Saffioti, Ian Piper, Ashwi...
SAC
2008
ACM
13 years 8 months ago
Towards a complete SCM ontology: the case of ontologising RosettaNet
This paper presents a methodology to derive a Supply Chain Management Ontology based on the RosettaNet specification framework. A prototype to mechanically derive a core ontology ...
Armin Haller, Jedrzej Gontarczyk, Paavo Kotinurmi
EGC
2005
Springer
14 years 2 months ago
Security Architecture for Open Collaborative Environment
Abstract. The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the...
Yuri Demchenko, Leon Gommans, Cees de Laat, Bas va...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
ICFP
2005
ACM
14 years 9 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...