Sciweavers

581 search results - page 54 / 117
» policy 2009
Sort
View
SDMW
2009
Springer
14 years 3 months ago
Controlling Access to XML Documents over XML Native and Relational Databases
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We de...
Lazaros Koromilas, George Chinis, Irini Fundulaki,...
AINA
2009
IEEE
14 years 1 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
CDC
2009
IEEE
111views Control Systems» more  CDC 2009»
14 years 1 months ago
An optimal investment problem with randomly terminating income
Abstract— We investigate an optimal consumption and investment problem where we receive a certain fixed income stream that is terminated at a random time. It turns out that the ...
Michel H. Vellekoop, Mark Davis
IWANN
2009
Springer
14 years 1 months ago
User Configuration of Activity Awareness
This paper describes an approach to user configuration of activity awareness. This approach offers users increased flexibility by allowing the use of multiple methods of configurat...
Tony McBryan, Philip D. Gray
DLOG
2009
13 years 9 months ago
Using Description Logics in Relation Based Access Control
Relation Based Access Control (RelBAC) is an access control model designed for the new scenarios of access control on Web 2.0. Under this model, we discuss in this paper how to for...
Rui Zhang, Alessandro Artale, Fausto Giunchiglia, ...