Sciweavers

1928 search results - page 167 / 386
» Integrity Constraints in OWL
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ICWS
2008
IEEE
14 years 6 days ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
HICSS
2009
IEEE
74views Biometrics» more  HICSS 2009»
14 years 5 months ago
Unleashing Mobility in the Organization: A Time-Geography Perspective
The increased fluidity and agility of organizations demand the smooth mediation of information technology (IT) between user and task. As rigid hierarchies are giving way to open, ...
Douglas M. Schutz, Yong-Young Kim, Youngjin Yoo
DOLAP
2004
ACM
14 years 4 months ago
An analysis of additivity in OLAP systems
Accurate summary data is of paramount concern in data warehouse systems; however, there have been few attempts to completely characterize the ability to summarize measures. The su...
John Horner, Il-Yeol Song, Peter P. Chen
IJIIDS
2010
115views more  IJIIDS 2010»
13 years 9 months ago
Towards the preservation of functional dependency in XML data transformation
With the advent of XML as a data representation and exchange format over the web, a massive amount of data is being stored in XML. The task of data transformation for integration ...
Md. Sumon Shahriar, Jixue Liu