Sciweavers

1830 search results - page 51 / 366
» Implementing a Tamper-Evident Database System
Sort
View
RBAC
1998
101views more  RBAC 1998»
13 years 9 months ago
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment
In role-based access control RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. Using RBAC ...
Ravi S. Sandhu, Venkata Bhamidipati
SPLC
2007
13 years 8 months ago
A Case Study Implementing Features Using AspectJ
Software product lines aim to create highly configurable programs from a set of features. Common belief and recent studies suggest that aspects are well-suited for implementing f...
Christian Kästner, Sven Apel, Don S. Batory
SEMWEB
2009
Springer
14 years 2 months ago
Classifying ELH Ontologies In SQL Databases
Abstract. The current implementations of ontology classification procedures use the main memory of the computer for loading and processing ontologies, which soon can become one of...
Vincent Delaitre, Yevgeny Kazakov
DBSEC
2004
91views Database» more  DBSEC 2004»
13 years 9 months ago
Implementing Real-Time Update of Access Control Policies
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical appl...
Indrakshi Ray, Tai Xin
DSN
2000
IEEE
14 years 4 days ago
Implementing e-Transactions with Asynchronous Replication
ts the abstraction of e-Transactions in three-tier architectures. Three-tier architectures are typically Internetoriented architectures, where the end-user interacts with frontend ...
Svend Frølund, Rachid Guerraoui