Sciweavers

SIS
2004
14 years 24 days ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
SIS
2004
14 years 24 days ago
Efficient Tree Search in Encrypted Data
Abstract. Sometimes there is a need to store sensitive data on an untrusted database server. Song, Wagner and Perrig have introduced a way to search for the existence of a word in ...
Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter...
SIS
2004
14 years 24 days ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
SIS
2007
14 years 26 days ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
SIS
2007
14 years 26 days ago
An Ontology for the Expression of Intellectual Property Entities and Relations
Ontologies represent knowledge in a particular area. Intellectual Property (IP) Entities lifecycle lacks any explicit standard representation, and a semantic expression of its proc...
Víctor Rodríguez-Doncel, Marc Gauvin...