Sciweavers

1795 search results - page 81 / 359
» Security Models and Information Flow
Sort
View
140
Voted
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 5 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
ICIP
2005
IEEE
16 years 5 months ago
Flow lookup and biological motion perception
Optical flow in monocular video can serve as a key for recognizing and tracking the three-dimensional pose of human subjects. In comparison with prior work using silhouettes as a ...
Nicholas R. Howe
126
Voted
DEXAW
2004
IEEE
80views Database» more  DEXAW 2004»
15 years 7 months ago
Traceable Document Flows
Ad-hoc data exchange, e.g., by sending email attachments, leads to multiple copies or versions of a document at dispersed nodes in a network. However, their relationships such as ...
Martin Bernauer, Gerti Kappel, Elke Michlmayr
135
Voted
APLAS
2003
ACM
15 years 7 months ago
Dataflow Pointcut in Aspect-Oriented Programming
A dataflow-based pointcut is proposed for aspect-oriented programming (AOP) languages. The pointcut specifies where aspects should be applied based on the origins of values. It is ...
Hidehiko Masuhara, Kazunori Kawauchi
150
Voted
SACMAT
2009
ACM
15 years 10 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang