Sciweavers

316 search results - page 19 / 64
» Variations in Access Control Logic
Sort
View
CCR
2005
96views more  CCR 2005»
13 years 7 months ago
A protocol for packet network intercommunication
-- A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packe...
Vinton G. Cerf, Robert E. Kahn
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 2 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
CSFW
2008
IEEE
14 years 2 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
BMCBI
2010
138views more  BMCBI 2010»
13 years 7 months ago
A database and API for variation, dense genotyping and resequencing data
Background: Advances in sequencing and genotyping technologies are leading to the widespread availability of multi-species variation data, dense genotype data and large-scale rese...
Daniel Rios, William M. McLaren, Yuan Chen, Ewan B...
BMCBI
2006
86views more  BMCBI 2006»
13 years 7 months ago
Identification of QTLs controlling gene expression networks defined a priori
Background: Gene expression microarrays allow the quantification of transcript accumulation for many or all genes in a genome. This technology has been utilized for a range of inv...
Daniel J. Kliebenstein, Marilyn A. L. West, Hans v...