Sciweavers

1147 search results - page 117 / 230
» Transformation of Access Rights
Sort
View
CCS
2008
ACM
13 years 11 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...
SIS
2007
13 years 10 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
ECIS
2004
13 years 10 months ago
Stray dogs and wild cats tracking down information systems in government?
This paper explores the body of e-government research surfaced during 1998-2003 in Web of Science and ProQuest. The search identified 158 scholarly papers. Using a classification ...
Kim Viborg Andersen, Helle Zinner Henriksen, Amar ...
ENTCS
2006
120views more  ENTCS 2006»
13 years 9 months ago
Timers for Distributed Systems
We deal with temporal aspects of distributed systems, introducing and studying a new model called timed distributed -calculus. This model extends distributed -calculus with timers...
Gabriel Ciobanu, Cristian Prisacariu
WWW
2004
ACM
14 years 9 months ago
XML data mediator integrated solution for xml roundtrip from xml to relational
This paper presents a system for efficient data transformations between XML and relational databases, called XML Data Mediator (XDM). XDM enables the transformation by externalizi...
Nianjun Zhou, George A. Mihaila, Dikran S. Melikse...