Sciweavers

80 search results - page 3 / 16
» Audit logs: to keep or not to keep
Sort
View
ICFP
2008
ACM
14 years 5 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
SEMWEB
2005
Springer
13 years 11 months ago
Ontology Change Detection Using a Version Log
In this article, we propose a new ontology evolution approach that combines a top-down and a bottom-up approach. This means that the manual request for changes (top-down) by the on...
Peter Plessers, Olga De Troyer
LISA
2004
13 years 7 months ago
Real-time Log File Analysis Using the Simple Event Correlator (SEC)
Originally published at Usenix LISA 2004 conference. November 2004 Atlanta, Georiga, USA. Log analysis is an important way to keep track of computers and networks. The use of auto...
John P. Rouillard
CLEF
2010
Springer
13 years 6 months ago
SINAI at LogCLEF 2010
The SINAI1 research group presents some results obtained after performing a brief analysis to the query logs from The European Library2 (TEL). The objective of the LogCLEF task is ...
José M. Perea-Ortega, Arturo Montejo R&aacu...
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
13 years 11 months ago
Integrated Health Log: Share Multimedia Patient Data
The Integrated Health Log demonstrator shows how multimedia can be used in collaborative settings in healthcare. Patient data can be shared annotated discussed and processed by me...
Rogier Brussee, Paul Porskamp, Leon van den Oord, ...