Sciweavers

14 search results - page 2 / 3
» sis 2008
Sort
View
SIS
2008
13 years 6 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
CAISE
2008
Springer
13 years 6 months ago
Sustainable Information Systems: A Knowledge Perspective
Abstract. We propose a reorientation of the way the concept of sustainability is dealt with in relation to information systems, positioning the processing of knowledge at the centr...
Laura Maruster, Niels R. Faber, Kristian Peters
CCS
2008
ACM
13 years 6 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
TCAD
2008
116views more  TCAD 2008»
13 years 4 months ago
Scalable Synthesis and Clustering Techniques Using Decision Diagrams
BDDs have proven to be an efficient means to represent and manipulate Boolean formulae [1] and sets [2] due to their compactness and canonicality. In this work, we leverage the eff...
Andrew C. Ling, Jianwen Zhu, Stephen Dean Brown
AGIS
1998
169views more  AGIS 1998»
13 years 4 months ago
The Configuration and Implementation of a Hybrid 3-D GIS for Urban Data Management
With the development of modern cities, 3-D spatial information systems (SIS) are increasingly required for spatial planning, communication systems and other applications. The geom...
Xinhua Wang, Armin Gruen