Sciweavers

379 search results - page 36 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
IADIS
2004
13 years 9 months ago
A Framework for Symbolic Distributed Computer-Aided Design over the Internet
Economical globalization and outsourcing have inspired the surge of research in distributed computer-aided design. This paper presents a framework for Internet-based symbolic dist...
Yingcai Xiao, Shivakumar Kubendrachari
COLING
2002
13 years 7 months ago
Text Authoring, Knowledge Acquisition and Description Logics
We present a principled approach to the problem of connecting a controlled document authoring system with a knowledge base. We start by describingclosed-world authoring situations...
Marc Dymetman
SAC
2005
ACM
14 years 1 months ago
A case study of separation of duty properties in the context of the Austrian "eLaw" process
Over the last few years rapid progress has been made in moving from conceptual studies, “whitepapers” and initiatives to the actual deployment of e-Government systems [13]. In...
Andreas Schaad, Pascal Spadone, Helmut Weichsel
SACMAT
2006
ACM
14 years 1 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
ICDCS
2000
IEEE
14 years 2 days ago
Active Files: A Mechanism for Integrating Legacy Applications into Distributed Systems
Despite increasingly distributed internet information sources with diverse storage formats and access-control constraints, most of the end applications (e.g., filters and media p...
Partha Dasgupta, Ayal Itzkovitz, Vijay Karamcheti