Sciweavers

12 search results - page 1 / 3
» A Difference Resolution Approach to Compressing Access Contr...
Sort
View
ACSAC
2000
IEEE
13 years 9 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
CCS
2007
ACM
13 years 11 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 4 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
SCFBM
2008
143views more  SCFBM 2008»
13 years 4 months ago
LSID Tester, a tool for testing Life Science Identifier resolution services
Background: Life Science Identifiers (LSIDs) are persistent, globally unique identifiers for biological objects. The decentralised nature of LSIDs makes them attractive for identi...
Roderic D. M. Page
CGF
1998
134views more  CGF 1998»
13 years 4 months ago
Progressive Iso-Surface Extraction from Hierarchical 3D Meshes
A multiresolution data decomposition offers a fundamental framework supporting compression, progressive transmission, and level-of-detail (LOD) control for large two or three dime...
Wenli Cai, Georgios Sakas, Roberto Grosso, Thomas ...