Sciweavers

1150 search results - page 34 / 230
» Specifying Information-Flow Controls
Sort
View
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
14 years 10 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
IEEEIAS
2007
IEEE
14 years 3 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
RAS
2006
97views more  RAS 2006»
13 years 9 months ago
Visuo-motor learning for face-to-face pass between heterogeneous humanoids
Humanoid behavior generation is one of the most formidable issues due to its complicated structure with many degrees of freedom. This paper proposes a controller for a humanoid to...
Masaki Ogino, Masaaki Kikuchi, Minoru Asada
MIDDLEWARE
2007
Springer
14 years 3 months ago
A service-oriented middleware for context-aware applications
Context awareness has emerged as an important element in distributed computing. It offers mechanisms that allow applications to be aware of their environment and enable these appl...
Luiz Olavo Bonino da Silva Santos, Remco Poortinga...
ESOP
2010
Springer
14 years 16 days ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers