Sciweavers

1034 search results - page 141 / 207
» Dynamic Access Control Framework Based On Events
Sort
View
COMCOM
2006
121views more  COMCOM 2006»
13 years 8 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
ALGORITHMICA
2004
74views more  ALGORITHMICA 2004»
13 years 8 months ago
Three-Dimensional Layers of Maxima
Abstract. We present an O(n log n)-time algorithm to solve the threedimensional layers-of-maxima problem, an improvement over the prior O(n log n log log n)-time solution. A previo...
Adam L. Buchsbaum, Michael T. Goodrich
ICOODB
2010
171views Database» more  ICOODB 2010»
13 years 6 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 2 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
ADC
2006
Springer
135views Database» more  ADC 2006»
14 years 2 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...