Sciweavers

366 search results - page 1 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
ICCS
2009
Springer
13 years 11 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
ICCS
2004
Springer
13 years 9 months ago
Improving Generalization Level in UML Models Iterative Cross Generalization in Practice
FCA has been successfully applied to software engineering tasks such as source code analysis and class hierarchy re-organization. Most notably, FCA hematics behind the mechanism of...
Michel Dao, Marianne Huchard, Mohamed Rouane Hacen...
CN
2000
76views more  CN 2000»
13 years 4 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
ICCS
2007
Springer
13 years 10 months ago
Supporting Lexical Ontology Learning by Relational Exploration
Designing and refining ontologies becomes a tedious task, once the boundary to real-world-size knowledge bases has been crossed. Hence semi-automatic methods supporting those task...
Sebastian Rudolph, Johanna Völker, Pascal Hit...
ECOOPW
1999
Springer
13 years 8 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad