Sciweavers

1081 search results - page 155 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
EDOC
2009
IEEE
14 years 3 months ago
Modelling and Reasoning Languages for Social Networks Policies
—Policy languages (such as privacy and rights) have had little impact on the wider community. Now that Social Networks have taken off, the need to revisit Policy languages and re...
Guido Governatori, Renato Iannella
QSIC
2007
IEEE
14 years 3 months ago
A Pattern-Based Constraint Description Approach for Web Services
Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-Security, WS-...
Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hon...
APCCM
2007
13 years 10 months ago
A Data Quality Metamodel Extension to CWM
The importance of metadata has been broadly referred in the last years, mainly in the field of data warehousing and decision support systems. Contemporarily, in the adjacent field...
Pedro Gomes, José Farinha, Maria José...
SACMAT
2003
ACM
14 years 2 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ISORC
2000
IEEE
14 years 1 months ago
A Vision of the Future for the Air Force (and Perhaps the Whole DoD)
The Air Force has enthusiastically endorsed, at its most senior levels, advanced thinking with regard to the application of information technology. Recently, the notion of a Joint...
Thomas F. Saunders