Sciweavers

316 search results - page 39 / 64
» Variations in Access Control Logic
Sort
View
ICDE
2008
IEEE
165views Database» more  ICDE 2008»
14 years 2 months ago
Semantic Web and firewall alignment
— Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach...
Simon N. Foley, William M. Fitzgerald
DKE
2002
118views more  DKE 2002»
13 years 7 months ago
Consistent policy enforcement in distributed systems using mobile policies
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges ...
Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amg...
VISSOFT
2005
IEEE
14 years 1 months ago
Multi-level Method Understanding Using Microprints
Understanding classes and methods is a key activity in object-oriented programming, since classes represent the abstractions from which applications are built, while methods conta...
Stéphane Ducasse, Michele Lanza, Romain Rob...
FPL
2001
Springer
136views Hardware» more  FPL 2001»
14 years 3 days ago
Building Asynchronous Circuits with JBits
Asynchronous logic design has been around for decades. However, only recently has it gained any commercial success. Research has focused on a wide variety of uses, from microproces...
Eric Keller
EUROMICRO
2004
IEEE
13 years 11 months ago
The Need for Declarative Security Mechanisms
Today, security is recognized as an absolute need in application development. Programming environments offer mechanisms and concepts allowing an easy integration of security mecha...
Stefan Probst, Josef Küng