Sciweavers

65 search results - page 2 / 13
» Correcting Access Restrictions to a Consequence
Sort
View
ADCOG
2004
13 years 6 months ago
Social and Ethical Considerations in Virtual Worlds
While networking technology facilitates the use of online services such as real-time instant messaging and anywhere-anytime multiplayer gaming, societal and ethical issues can inf...
Robert W. Kerbs
ICDE
2004
IEEE
128views Database» more  ICDE 2004»
14 years 6 months ago
Detection and Correction of Conflicting Source Updates for View Maintenance
Data integration over multiple heterogeneous data sources has become increasingly important for modern applications. The integrated data is usually stored in materialized views fo...
Songting Chen, Jun Chen, Xin Zhang, Elke A. Runden...
SACMAT
2004
ACM
13 years 10 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
ITC
1997
IEEE
123views Hardware» more  ITC 1997»
13 years 9 months ago
Modifying User-Defined Logic for Test Access to Embedded Cores
Testing embedded cores is a challenge because access to core I/Os is limited. The user-defined logic (ZJDL) surrounding the core may restrict the set of test vectors that can be a...
Bahram Pouya, Nur A. Touba
CSFW
2006
IEEE
13 years 10 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....