Sciweavers

1830 search results - page 51 / 366
» Implementing a Tamper-Evident Database System
Sort
View
114
Voted
RBAC
1998
101views more  RBAC 1998»
15 years 4 months ago
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment
In role-based access control RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. Using RBAC ...
Ravi S. Sandhu, Venkata Bhamidipati
139
Voted
SPLC
2007
15 years 4 months ago
A Case Study Implementing Features Using AspectJ
Software product lines aim to create highly configurable programs from a set of features. Common belief and recent studies suggest that aspects are well-suited for implementing f...
Christian Kästner, Sven Apel, Don S. Batory
97
Voted
SEMWEB
2009
Springer
15 years 10 months ago
Classifying ELH Ontologies In SQL Databases
Abstract. The current implementations of ontology classification procedures use the main memory of the computer for loading and processing ontologies, which soon can become one of...
Vincent Delaitre, Yevgeny Kazakov
DBSEC
2004
91views Database» more  DBSEC 2004»
15 years 4 months ago
Implementing Real-Time Update of Access Control Policies
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical appl...
Indrakshi Ray, Tai Xin
102
Voted
DSN
2000
IEEE
15 years 7 months ago
Implementing e-Transactions with Asynchronous Replication
ts the abstraction of e-Transactions in three-tier architectures. Three-tier architectures are typically Internetoriented architectures, where the end-user interacts with frontend ...
Svend Frølund, Rachid Guerraoui