Sciweavers

979 search results - page 132 / 196
» Developing Dynamic Security Policies
Sort
View
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 11 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
WPES
2003
ACM
14 years 3 months ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
ICRA
1994
IEEE
87views Robotics» more  ICRA 1994»
14 years 2 months ago
Experiments in Object Impedance Control for Flexible Objects
This paper presents a control strategy for manipulation of exible objects by multiple robot arms. The control policy developed in this paper for exible objects is based on a contr...
David W. Meer, Stephen M. Rock
ER
2003
Springer
144views Database» more  ER 2003»
14 years 3 months ago
A Framework for Business Rule Driven Web Service Composition
With web services emerging as a promising technology for supporting open and dynamic business processes, it is witnessed that standards for business process specification in the c...
Bart Orriëns, Jian Yang, Mike P. Papazoglou
WECWIS
2005
IEEE
141views ECommerce» more  WECWIS 2005»
14 years 3 months ago
An Adaptive Bilateral Negotiation Model for E-Commerce Settings
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...
Vidya Narayanan, Nicholas R. Jennings