Sciweavers

379 search results - page 6 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
BIRTHDAY
2005
Springer
14 years 1 months ago
Compiled Labelled Deductive Systems for Access Control
This paper proposes a Compiled Labelled Deductive System, called ACCLDS, for reasoning about role-based access control in distributed systems, which builds upon Massacci’s tablea...
Krysia Broda, Alessandra Russo
DOOD
1995
Springer
93views Database» more  DOOD 1995»
13 years 11 months ago
A Query Translation Scheme for Rapid Implementation of Wrappers
Wrappers provide access to heterogeneous information sources by converting application queries into source speci c queries or commands. In this paper we present a wrapper implemen...
Yannis Papakonstantinou, Ashish Gupta, Hector Garc...
COLCOM
2009
IEEE
14 years 7 days ago
Aggregating uncertain access risk estimations from different sources invited paper
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Qun Ni, Elisa Bertino
ENTCS
2007
101views more  ENTCS 2007»
13 years 7 months ago
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic
We describe a programme of research in resource semantics, concurrency theory, bunched logic, and stochastic processes, as applied to mathematical systems modelling. Motivated by ...
David J. Pym, Chris M. N. Tofts
BPM
2009
Springer
143views Business» more  BPM 2009»
14 years 2 months ago
Integrating Users in Object-Aware Process Management Systems: Issues and Challenges
Despite the increasing maturity of contemporary Workflow Management Systems (WfMS), there still exist numerous process-aware application systems with more or less hard-coded proce...
Vera Künzle, Manfred Reichert