Sciweavers

25 search results - page 4 / 5
» Managing Authorization Provenance: A Modal Logic Based Appro...
Sort
View
IJCAI
1993
13 years 8 months ago
The Range of Applicability of Nonmonotonic Logics for the Inertia Problem
We introduce and use a new methodology for the study of logics for action and change. The methodology allows one to define a taxonomy of reasoning problems, based in particular on...
Erik Sandewall
ESORICS
2006
Springer
13 years 11 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
VRCAI
2004
ACM
14 years 26 days ago
Explorative construction of virtual worlds: an interactive kernel approach
Despite steady research advances in many aspects of virtual reality, building and testing virtual worlds remains to be a very difficult process. Most virtual environments are stil...
Jinseok Seo, Gerard Jounghyun Kim
CODASPY
2011
12 years 11 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
INEX
2004
Springer
14 years 24 days ago
The Utrecht Blend: Basic Ingredients for an XML Retrieval System
Exploiting the structure of a document allows for more powerful information retrieval techniques. In this article a basic approach is discussed for the retrieval of XML document f...
Roelof van Zwol, Frans Wiering, Virginia Dignum