Sciweavers

2181 search results - page 315 / 437
» The restriction scaffold problem
Sort
View
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 2 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
SDMW
2004
Springer
14 years 2 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
SEMWEB
2004
Springer
14 years 2 months ago
Learning Meta-descriptions of the FOAF Network
We argue that in a distributed context, such as the Semantic Web, ontology engineers and data creators often cannot control (or even imagine) the possible uses their data or ontolo...
Gunnar Aastrand Grimnes, Peter Edwards, Alun D. Pr...
SPATIALCOGNITION
2004
Springer
14 years 2 months ago
Branching Allen
Allen’s interval calculus is one of the most prominent formalisms in the domain of qualitative spatial and temporal reasoning. Applications of this calculus, however, are restric...
Marco Ragni, Stefan Wölfl
UML
2004
Springer
14 years 2 months ago
Supporting Model Refactorings Through Behaviour Inheritance Consistencies
Abstract. This paper addresses the problem of consistency preservation in model-driven software development. Software models typically embody many different views that need to be ...
Ragnhild Van Der Straeten, Viviane Jonckers, Tom M...