Sciweavers

1147 search results - page 78 / 230
» Transformation of Access Rights
Sort
View
WORDS
2005
IEEE
14 years 2 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
COLCOM
2007
IEEE
13 years 10 months ago
Using context to assist the adaptation of protected multimedia content in virtual collaboration applications
—This paper proposes a framework for a virtual classroom application based on a Virtual Collaboration System (VCS), which is being developed under the VISNET II Network of Excell...
Maria Teresa Andrade, Hemantha Kodikara Arachchi, ...
SDMW
2007
Springer
14 years 2 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
ESCIENCE
2006
IEEE
14 years 13 days ago
Remote Control of Web 2.0-Enabled Laboratories from Mobile Devices
The design of WebLabs has traditionally been focused on the hardware rather than the software side. However, paying more importance to the software side can bring about important ...
Diego López de Ipiña, Javier Garc&ia...
EDBT
2000
ACM
14 years 11 days ago
Management and Query Processing of One-Dimensional Intervals with the UB-Tree
The management and query processing of one dimensional intervals is a special case of extended object handling. One dimensional intervals play an important role in temporal databa...
Robert Fenk