Sciweavers

1147 search results - page 12 / 230
» Transformation of Access Rights
Sort
View
GPCE
2009
Springer
14 years 1 months ago
Classifying Java class transformations for pervasive virtualized access
The indirection of object accesses is a common theme for target domains as diverse as transparent distribution, persistence, and program instrumentation. Virtualizing accesses to ...
Phil McGachey, Antony L. Hosking, J. Eliot B. Moss
ENTCS
2008
80views more  ENTCS 2008»
13 years 8 months ago
Locality of Corner Transformation for Multidimensional Spatial Access Methods
Ho-Kwok Dai, Kyu-Young Whang, Hung-Chi Su
EOR
2006
82views more  EOR 2006»
13 years 8 months ago
Flowshop scheduling research after five decades
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...
Jatinder N. D. Gupta, Edward F. Stafford
ICDE
2003
IEEE
162views Database» more  ICDE 2003»
14 years 10 months ago
Dynamic Access Control Framework Based On Events
Access Control policies in e-commerce domain can be quite complex, affecting the response time provided to the users. We describe an event-based access control system that can pot...
Manish Bhide, Sandeep Pandey, Ajay Gupta 0004, Muk...
ACSW
2004
13 years 10 months ago
A Case Study in Access Control Requirements for a Health Information System
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involv...
Mark Evered, Serge Bögeholz