Sciweavers

229 search results - page 18 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
CODASPY
2012
12 years 3 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
CCS
2010
ACM
13 years 2 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
CGF
2008
227views more  CGF 2008»
13 years 7 months ago
Dynamic Sampling and Rendering of Algebraic Point Set Surfaces
Algebraic Point Set Surfaces (APSS) define a smooth surface from a set of points using local moving least-squares (MLS) fitting of algebraic spheres. In this paper we first revisi...
Gaël Guennebaud, Marcel Germann, Markus H. Gr...
DGO
2000
91views Education» more  DGO 2000»
13 years 9 months ago
Simplifying data access: the energy data collection (EDC) project
The massive amount of statistical and text data available from government agencies has created a set of daunting challenges to both research and analysis communities. These proble...
José Luis Ambite, Yigal Arens, Luis Gravano...
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
13 years 11 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...