Sciweavers

807 search results - page 2 / 162
» Term Rewriting for Access Control
Sort
View
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
14 years 5 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
NTMS
2008
IEEE
13 years 11 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
CAINE
2001
13 years 6 months ago
Intelligent Network Control Using Object-Oriented Term-Rewriting
In this paper, we describe the theoretical framework that allows us to use of the expert system shell CLIPS to define the network model in the Distribution Management System (DMS)...
Adam Steele
WADT
1998
Springer
13 years 9 months ago
Complete Strategies for Term Graph Narrowing
Abstract. Narrowing is a method for solving equations in the equational theories of term rewriting systems. Unification and rewriting, the central operations in narrowing, are ofte...
Annegret Habel, Detlef Plump
RTA
2010
Springer
13 years 8 months ago
Closing the Gap Between Runtime Complexity and Polytime Computability
In earlier work, we have shown that for confluent term rewrite systems (TRSs for short), innermost polynomial runtime complexity induces polytime computability of the functions de...
Martin Avanzini, Georg Moser