Sciweavers

3303 search results - page 104 / 661
» Multidimensional Access Methods
Sort
View
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
13 years 9 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
DLOG
2010
13 years 7 months ago
Correcting Access Restrictions to a Consequence
Recent research has shown that annotations are useful for representing access restrictions to the axioms of an ontology and their implicit consequences. Previous work focused on co...
Martin Knechtel, Rafael Peñaloza
FQAS
2006
Springer
136views Database» more  FQAS 2006»
14 years 20 days ago
Robust Query Processing for Personalized Information Access on the Semantic Web
Abstract. Research in Cooperative Query answering is triggered by the observation that users are often not able to correctly formulate queries to databases that return the intended...
Peter Dolog, Heiner Stuckenschmidt, Holger Wache
ESWS
2008
Springer
13 years 10 months ago
Semantic Sitemaps: Efficient and Flexible Access to Datasets on the Semantic Web
Increasing amounts of RDF data are available on the Web for consumption by Semantic Web browsers and indexing by Semantic Web search engines. Current Semantic Web publishing practi...
Richard Cyganiak, Holger Stenzhorn, Renaud Delbru,...
FASE
2010
Springer
13 years 7 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim