Sciweavers

1147 search results - page 158 / 230
» Transformation of Access Rights
Sort
View
MODELLIERUNG
2008
14 years 6 days ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
IADIS
2003
14 years 4 days ago
Application of Metadata and Replication Mechanisms in Industrial Databases
Power transformers' failures carry great costs to electric companies since they need resources to recover from them and to perform periodical maintenance. To avoid this probl...
Perfecto Mariño, César A. Sigüe...
ICDE
2009
IEEE
160views Database» more  ICDE 2009»
13 years 8 months ago
Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting
Data provenance is information that describes how a given data item was produced. The provenance includes source and intermediate data as well as the transformations involved in pr...
Boris Glavic, Gustavo Alonso
TSP
2010
13 years 5 months ago
Power allocation for a MIMO relay system with multiple-antenna users
A power allocation or scheduling problem is studied for a multiuser multiple-input multiple-output (MIMO) wireless relay system where there is a non-regenerative relay between one ...
Yuan Yu, Yingbo Hua
HICSS
2012
IEEE
285views Biometrics» more  HICSS 2012»
12 years 6 months ago
Identifying Informational Needs for Open Government: The Case of Egypt
The success of open government initiatives depends on understanding the informational needs of the concerned citizens and other stakeholders as prerequisite for open access to rel...
Ralf Klischewski