Sciweavers

2024 search results - page 301 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
125
Voted
POPL
1995
ACM
15 years 7 months ago
Parametric Program Slicing
Program slicing is a technique for isolating computational threads in programs. In this paper, we show how to mechanically extract a family of practical algorithms for computing s...
John Field, G. Ramalingam, Frank Tip
144
Voted
CP
2003
Springer
15 years 8 months ago
Using Constraints for Exploring Catalogs
Abstract. Searching objects within a catalog is a problem of increasing importance, as the general public has access to increasing volumes of data. Constraint programming has addre...
François Laburthe, Yves Caseau
124
Voted
ISN
2000
Springer
120views Communications» more  ISN 2000»
15 years 7 months ago
Providing Customisable Network Management Services Through Mobile Agents
Telecommunications network management has attracted a lot of attention in terms of research and standardisation in the last decade. TMN and TINA architectural frameworks try to add...
David Griffin, George Pavlou, Panos Georgatsos
WWW
2004
ACM
16 years 4 months ago
Adapting databases and WebDAV protocol
The ability of the Web to share data regardless of geographical location raises a new issue called remote authoring. With the Internet and Web browsers being independent of hardwa...
Bita Shadgar, Ian Holyer
ENTCS
2008
130views more  ENTCS 2008»
15 years 3 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...