Sciweavers

347 search results - page 65 / 70
» Foundations of Preferences in Database Systems
Sort
View
CCS
2007
ACM
14 years 3 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
ISSTA
2006
ACM
14 years 3 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
CLEANDB
2006
ACM
142views Database» more  CLEANDB 2006»
13 years 11 months ago
QUEST: QUery-driven Exploration of Semistructured Data with ConflicTs and Partial Knowledge
An important reality when integrating scientific data is the fact that data may often be "missing", partially specified, or conflicting. Therefore, in this paper, we pre...
Yan Qi 0002, K. Selçuk Candan, Maria Luisa ...
BMCBI
2008
152views more  BMCBI 2008»
13 years 9 months ago
JCoast - A biologist-centric software tool for data mining and comparison of prokaryotic (meta)genomes
Background: Current sequencing technologies give access to sequence information for genomes and metagenomes at a tremendous speed. Subsequent data processing is mainly performed b...
Michael Richter, Thierry Lombardot, Ivaylo Kostadi...
DEBU
2008
100views more  DEBU 2008»
13 years 9 months ago
WAVE: Automatic Verification of Data-Driven Web Services
Data-driven Web services, viewed broadly as interactive systems available on the Web for users and programs, provide the backbone for increasingly complex Web applications. While ...
Alin Deutsch, Victor Vianu