Sciweavers

807 search results - page 59 / 162
» Term Rewriting for Access Control
Sort
View
144
Voted
CCS
2006
ACM
15 years 7 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
254
Voted
ICDE
2007
IEEE
126views Database» more  ICDE 2007»
16 years 5 months ago
QPIAD: Query Processing over Incomplete Autonomous Databases
Incompleteness due to missing attribute values (aka "null values") is very common in autonomous web databases, on which user accesses are usually supported through media...
Hemal Khatri, Jianchun Fan, Yi Chen, Subbarao Kamb...
224
Voted
VLDB
2007
ACM
141views Database» more  VLDB 2007»
16 years 3 months ago
Query Processing over Incomplete Autonomous Databases
Incompleteness due to missing attribute values (aka "null values") is very common in autonomous web databases, on which user accesses are usually supported through media...
Garrett Wolf, Hemal Khatri, Bhaumik Chokshi, Jianc...
219
Voted
CODASPY
2011
14 years 7 months ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu
141
Voted
VRML
2009
ACM
15 years 10 months ago
Extending X3D for distributed multimedia processing and control
Web-based applications of interactive 3D computer graphics are showing a tendency to get more interconnected and visually complex. Virtual communities like Second Life demand real...
Michael Repplinger, Alexander Löffler, Benjam...