Sciweavers

433 search results - page 62 / 87
» Using Description Logics in Relation Based Access Control
Sort
View
ER
2010
Springer
129views Database» more  ER 2010»
13 years 6 months ago
SQOWL: Type Inference in an RDBMS
In this paper we describe a method to perform type inference over data stored in an RDBMS, where rules over the data are specified using OWLDL. Since OWL-DL is an implementation of...
Peter McBrien, Nikos Rizopoulos, Andrew Smith
DLOG
2003
13 years 9 months ago
Wine Agent: Semantic Web Testbed Application
The Wine Agent is a demonstration system that uses an underlying domain ontology to provide suitable wines for a given meal. In doing so it serves as a testbed, not only for the l...
Eric I. Hsu, Deborah L. McGuinness
WWW
2006
ACM
14 years 8 months ago
Model-based version and configuration management for a web engineering lifecycle
During a lifecycle of a large-scale Web application, Web developers produce a wide variety of inter-related Web objects. Following good Web engineering practice, developers often ...
Tien Nhut Nguyen
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 9 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald