Sciweavers

270 search results - page 3 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
IDEAS
2005
IEEE
109views Database» more  IDEAS 2005»
14 years 4 months ago
Efficient Relational Joins with Arithmetic Constraints on Multiple Attributes
We introduce and study a new class of queries that we refer to as ACMA (arithmetic constraints on multiple attributes) queries. Such combinatorial queries require the simultaneous...
Chuang Liu, Lingyun Yang, Ian T. Foster
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 2 months ago
Efficient Group Management For Inter-PN Access Control
This paper presents an architecture for resource sharing in Personal Networks (PNs). Resources are not necessarily in the same authentication domain and the group that uses them is...
Ahmad Ahmad, Khaled Masmoudi, Hossam Afifi
EDBT
2009
ACM
170views Database» more  EDBT 2009»
14 years 2 months ago
Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases
The classic Generalized Sequential Patterns (GSP) algorithm returns all frequent sequences present in a database. However, usually a few ones are interesting from a user's po...
Leticia I. Gómez, Alejandro A. Vaisman
ESORICS
2007
Springer
14 years 2 months ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter
AUSAI
2004
Springer
14 years 4 months ago
A Logic Based Approach for Dynamic Access Control
The PolicyUpdater1 system is a fully-implemented access control system that provides policy evaluations as well as dynamic policy updates. These functions are achieved by the use o...
Vino Fernando Crescini, Yan Zhang