Sciweavers

1150 search results - page 62 / 230
» Specifying Information-Flow Controls
Sort
View
ECOOP
1999
Springer
15 years 7 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
121
Voted
KBSE
1999
IEEE
15 years 6 months ago
Controlled Natural Language Can Replace First-Order Logic
Many domain specialists are not familiar or comfortable with formal notations and formal tools like theorem provers or model generators. To address this problem we developed Attem...
Norbert E. Fuchs, Uta Schwertel, Sunna Torge
136
Voted
SIGGRAPH
1990
ACM
15 years 6 months ago
Fast animation and control of nonrigid structures
We describe a fast method for creating physically based animation of non-rigid objects. Rapid simulation of nonrigid behavior is based on global deformations. Constraints are used...
Andrew P. Witkin, William Welch
118
Voted
IWAN
2000
Springer
15 years 6 months ago
Two Rule-Based Building-Block Architectures for Policy-Based Network Control
Policy-based networks can be customized by users by injecting programs called policies into the network nodes. So if general-purpose functions can be specified in a policy-based ne...
Yasusi Kanada
119
Voted
DBSEC
2010
152views Database» more  DBSEC 2010»
15 years 4 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan