Sciweavers

807 search results - page 9 / 162
» Term Rewriting for Access Control
Sort
View
ISI
2006
Springer
13 years 7 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara
PPDP
2009
Springer
14 years 1 months ago
Set functions for functional logic programming
We propose a novel approach to encapsulate non-deterministic computations in functional logic programs. Our approach is based on set functions that return the set of all the resul...
Sergio Antoy, Michael Hanus
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 8 months ago
Rewriting Regular XPath Queries on XML Views
We study the problem of answering queries posed on virtual views of XML documents, a problem commonly encountered when enforcing XML access control and integrating data. We approa...
Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios K...
SOUPS
2006
ACM
14 years 1 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
INFOCOM
2011
IEEE
12 years 10 months ago
Pricing-based spectrum access control in cognitive radio networks with random access
Abstract—Market-based mechanisms offer promising approaches for spectrum access in cognitive radio networks. In this paper, we focus on two market models, one with a monopoly pri...
Lei Yang, Hongseok Kim, Junshan Zhang, Mung Chiang...