Sciweavers

4496 search results - page 829 / 900
» DACS Web Service
Sort
View
FASE
2006
Springer
14 years 1 months ago
A Graph-Based Approach to Transform XML Documents
Abstract. As XML diffusion keeps increasing, it is today common practice for most developers to deal with XML parsing and transformation. XML is used as format to e.g. render data,...
Gabriele Taentzer, Giovanni Toffetti Carughi
FLOPS
2006
Springer
14 years 1 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
CSFW
1995
IEEE
14 years 1 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
VLDB
2000
ACM
119views Database» more  VLDB 2000»
14 years 1 months ago
Process Automation as the Foundation for E-Business
E-business is becoming the trademark of the 2000s. Companies are using the Web to communicate with their partners, connect with their back-end systems, and perform e-commerce tran...
Fabio Casati, Ming-Chien Shan
COMGEO
2010
ACM
14 years 28 days ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann