Sciweavers

209 search results - page 2 / 42
» Exploiting Information Relationships for Access Control
Sort
View
CIKM
2005
Springer
13 years 10 months ago
The case for access control on XML relationships
With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attentio...
Béatrice Finance, Saïda Medjdoub, Phil...
ICISS
2005
Springer
13 years 10 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
KBS
2000
122views more  KBS 2000»
13 years 5 months ago
Creating knowledge maps by exploiting dependent relationships
Knowledge is an interesting concept that has attracted the attention of philosophers for thousands of years. In more recent times, researchers have investigated knowledge in a mor...
John L. Gordon
JODS
2007
138views Data Mining» more  JODS 2007»
13 years 5 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
OTM
2005
Springer
13 years 10 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert