Sciweavers

114 search results - page 2 / 23
» On the Controlled Evolution of Access Rules in Cooperative I...
Sort
View
IASSE
2004
13 years 6 months ago
System Evolution through Design Information Evolution: a Case Study
This paper describes how design information, in our case UML specifications, can be used to evolve a software system and validate the consistency of such an evolution. This work c...
Walter Cazzola, Ahmed Ghoneim, Gunter Saake
WWW
2006
ACM
14 years 5 months ago
Using semantic rules to determine access control for web services
Semantic Web technologies are bring increasingly employed to solve knowledge management issues in traditional Web technologies. This paper follows that trend and proposes using Se...
Brian Shields, Owen Molloy, Gerard Lyons, Jim Dugg...
FQAS
2006
Springer
136views Database» more  FQAS 2006»
13 years 9 months ago
Robust Query Processing for Personalized Information Access on the Semantic Web
Abstract. Research in Cooperative Query answering is triggered by the observation that users are often not able to correctly formulate queries to databases that return the intended...
Peter Dolog, Heiner Stuckenschmidt, Holger Wache
CIKM
2005
Springer
13 years 10 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
13 years 9 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...