Sciweavers

1082 search results - page 67 / 217
» Policy support for call control
Sort
View
IADIS
2004
13 years 11 months ago
Constructing digital libraries with quality
Digital Libraries can be considered islands of specialized collections on the Web, which have their own management policy to control publishing and access, offering an environment...
Ewerton M. Salvador, José Jorge L. D. Jr., ...
SMC
2010
IEEE
157views Control Systems» more  SMC 2010»
13 years 8 months ago
Business Continuity management system that supports progress management and operational planning
— Japan is known as an “earthquake country” and hence both companies and governments require an operation management method called BCM to ensure that operations and services ...
Seigo Kawamura, Yoshio Nakatani
SACMAT
2009
ACM
14 years 4 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
VLDB
2007
ACM
116views Database» more  VLDB 2007»
14 years 10 months ago
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases
Databases are increasingly being used to store information covered by heterogeneous policies, which require support for access control with great flexibility. This has led to incr...
Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa...
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
14 years 4 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee