Sciweavers

772 search results - page 110 / 155
» Ontology Based Information Integration Using Logic Programmi...
Sort
View
ITCC
2005
IEEE
15 years 8 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
115
Voted
IUI
2012
ACM
13 years 10 months ago
A visual programming language for designing interactions embedded in web-based geographic applications
Visual programming languages (VPLs) provide notations for representing both the intermediate and the final results of a knowledge engineering process. Whereas some VPLs particula...
The Nhan Luong, Patrick Etcheverry, Christophe Mar...
104
Voted
BMCBI
2007
117views more  BMCBI 2007»
15 years 2 months ago
DNA-based watermarks using the DNA-Crypt algorithm
Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) ...
Dominik Heider, Angelika Barnekow
139
Voted
CCS
2011
ACM
14 years 2 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
135
Voted
ATAL
2008
Springer
15 years 4 months ago
Towards verifying compliance in agent-based web service compositions
We explore the problem of specification and verification of compliance in agent based Web service compositions. We use the formalism of temporal-epistemic logic suitably extended ...
Alessio Lomuscio, Hongyang Qu, Monika Solanki