Sciweavers

1150 search results - page 168 / 230
» Specifying Information-Flow Controls
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 9 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
IJCAI
1997
13 years 9 months ago
Reasoning about Concurrent Execution Prioritized Interrupts, and Exogenous Actions in the Situation Calculus
As an alternative to planning, an approach to highlevel agent control based on concurrent program execution is considered. A formal definition in the situation calculus of such a ...
Giuseppe De Giacomo, Yves Lespérance, Hecto...
BMCBI
2010
117views more  BMCBI 2010»
13 years 8 months ago
MetAssimulo: Simulation of Realistic NMR Metabolic Profiles
Background: Probing the complex fusion of genetic and environmental interactions, metabolic profiling (or metabolomics/metabonomics), the study of small molecules involved in meta...
Harriet J. Muncey, Rebecca Jones, Maria De Iorio, ...
CVGIP
2006
115views more  CVGIP 2006»
13 years 8 months ago
Methods for exploring expressive stance
The postures a character adopts over time are a key expressive aspect of her movement. While IK tools help a character achieve positioning constraints, there are few tools that he...
Michael Neff, Eugene Fiume
SIGMETRICS
2008
ACM
179views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Xengine: a fast and scalable XACML policy evaluation engine
XACML has become the de facto standard for specifying access control policies for various applications, especially web services. With the explosive growth of web applications depl...
Alex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie