Sciweavers

465 search results - page 75 / 93
» Software copyright and role models
Sort
View
CCS
2007
ACM
14 years 4 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
KBSE
2009
IEEE
14 years 4 months ago
A Petri Net Based Debugging Environment for QVT Relations
—In the Model-Driven Architecture (MDA) paradigm the Query/View/Transformation (QVT) standard plays a vital role for model transformations. Especially the high-level declarative ...
Manuel Wimmer, Gerti Kappel, Johannes Schönb&...
SACMAT
2009
ACM
14 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
BMCBI
2007
103views more  BMCBI 2007»
13 years 10 months ago
Dynamic simulation of regulatory networks using SQUAD
Background: The ambition of most molecular biologists is the understanding of the intricate network of molecular interactions that control biological systems. As scientists uncove...
Alessandro Di Cara, Abhishek Garg, Giovanni De Mic...