Sciweavers

270 search results - page 45 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
ICSE
2007
IEEE-ACM
14 years 7 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
JTAER
2008
82views more  JTAER 2008»
13 years 7 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
WWW
2004
ACM
14 years 8 months ago
An xpath-based discourse analysis module for spoken dialogue systems
This paper describes an XPath-based discourse analysis module for Spoken Dialogue Systems that allows the dialogue author to easily manipulate and query both the user input's...
Giuseppe Di Fabbrizio, Charles Lewis
ELPUB
1998
ACM
13 years 11 months ago
Towards an Information-Rich Society? Or an Information-Overloaded One? (Is the Media Becoming More Important Than the Message?)
The rapid growth in all forms of electronic publishing is creating many new problems – both technical and socio-economic. This paper examines some of these from three different ...
T. M. R. Ellis
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 9 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu