Sciweavers

270 search results - page 7 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
CINQ
2004
Springer
180views Database» more  CINQ 2004»
13 years 11 months ago
Interactivity, Scalability and Resource Control for Efficient KDD Support in DBMS
The conflict between resource consumption and query performance in the data mining context often has no satisfactory solution. This not only stands in sharp contrast to the need of...
Matthias Gimbel, Michael Klein, Peter C. Lockemann
CHI
2008
ACM
14 years 7 months ago
Evaluating motion constraints for 3D wayfinding in immersive and desktop virtual environments
Motion constraints providing guidance for 3D navigation have recently been suggested as a way of offloading some of the cognitive effort of traversing complex 3D environments on a...
Niklas Elmqvist, Mihail Eduard Tudoreanu, Philippa...
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 8 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
CNL
2009
13 years 8 months ago
Controlled English Ontology-Based Data Access
Abstract. As it is well-known, querying and managing structured data in natural language is a challenging task due to its ambiguity (syntactic and semantic) and its expressiveness....
Camilo Thorne, Diego Calvanese
SACMAT
2009
ACM
14 years 2 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...