The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
In a mobile environment, querying a database at a stationary server from a mobile client is expensive due to the limited bandwidth of a wireless channel and the instability of the ...
One of the objectives of ooDBMSs is to use type-speci c methods for manipulating objects, in order to maintain the consistency of the database. This is, however, little help for t...
When trying to apply recently developed approaches for updating Description Logic ABoxes in the context of an action programming language, one encounters two problems. First, upda...
Conrad Drescher, Hongkai Liu, Franz Baader, Steffe...
Abstract. Information concerning the origin of data (that is, its provenance) is important in many areas, especially scientific recordkeeping. Currently, provenance information mu...