Sciweavers

736 search results - page 13 / 148
» A Flexible Database Authorization System
Sort
View
SACMAT
2003
ACM
15 years 5 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
CCS
2006
ACM
15 years 3 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
VLDB
2007
ACM
154views Database» more  VLDB 2007»
15 years 5 months ago
P2P Authority Analysis for Social Communities
PageRank-style authority analyses of Web graphs are of great importance for Web mining. Such authority analyses also apply to hot “Web 2.0” applications that exhibit a natural...
Josiane Xavier Parreira, Sebastian Michel, Matthia...
VLDB
1990
ACM
116views Database» more  VLDB 1990»
15 years 3 months ago
Triggered Real-Time Databases with Consistency Constraints
Real-time database systems incorporate the notion of a deadline into the database system model. USUally, deadlines are associated with transactions, and the system attempts to exe...
Henry F. Korth, Nandit Soparkar, Abraham Silbersch...
VLDB
2002
ACM
166views Database» more  VLDB 2002»
14 years 11 months ago
COMA - A System for Flexible Combination of Schema Matching Approaches
Schema matching is the task of finding semantic correspondences between elements of two schemas. It is needed in many database applications, such as integration of web data source...
Hong Hai Do, Erhard Rahm