Sciweavers

1150 search results - page 38 / 230
» Specifying Information-Flow Controls
Sort
View
DSS
2006
140views more  DSS 2006»
13 years 9 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
CGF
2002
136views more  CGF 2002»
13 years 9 months ago
Designing 2D Vector Fields of Arbitrary Topology
We introduce a scheme of control polygons to design topological skeletons for vector fields of arbitrary topology. Based on this we construct piecewise linear vector fields of exa...
Holger Theisel
AAMAS
2002
Springer
13 years 9 months ago
A Scheduling Scheme for Controlling Allocation of CPU Resources for Mobile Programs
There is considerable interest in developing runtime infrastructures for programs that can migrate from one host to another. Mobile programs are appealing because they support eff...
Manoj Lal, Raju Pandey
ICDE
2006
IEEE
204views Database» more  ICDE 2006»
14 years 10 months ago
Collaborative Business Process Support in IHE XDS through ebXML Business Processes
Currently, clinical information is stored in all kinds of proprietary formats through a multitude of medical information systems available on the market. This results in a severe ...
Asuman Dogac, Veli Bicer, Alper Okcan
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 9 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese