Sciweavers

1081 search results - page 155 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
EDOC
2009
IEEE
15 years 11 months ago
Modelling and Reasoning Languages for Social Networks Policies
—Policy languages (such as privacy and rights) have had little impact on the wider community. Now that Social Networks have taken off, the need to revisit Policy languages and re...
Guido Governatori, Renato Iannella
QSIC
2007
IEEE
15 years 10 months ago
A Pattern-Based Constraint Description Approach for Web Services
Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-Security, WS-...
Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hon...
APCCM
2007
15 years 5 months ago
A Data Quality Metamodel Extension to CWM
The importance of metadata has been broadly referred in the last years, mainly in the field of data warehousing and decision support systems. Contemporarily, in the adjacent field...
Pedro Gomes, José Farinha, Maria José...
SACMAT
2003
ACM
15 years 9 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ISORC
2000
IEEE
15 years 8 months ago
A Vision of the Future for the Air Force (and Perhaps the Whole DoD)
The Air Force has enthusiastically endorsed, at its most senior levels, advanced thinking with regard to the application of information technology. Recently, the notion of a Joint...
Thomas F. Saunders