Sciweavers

1171 search results - page 203 / 235
» A Logical Language for Expressing Authorizations
Sort
View
ISTA
2004
15 years 1 months ago
A Conceptual Modeling Technique Based on Semantically Complete Model, Its Applications
: The article proposes a conceptual modeling technique based on Semantically Complete model, the main property of which is that relations carry complete information about interconn...
Vladimir Ovchinnikov
INFSOF
2000
91views more  INFSOF 2000»
14 years 11 months ago
An operational approach to the design of workflow systems
We construct models as an aid to our thought process. A particular class of models, operational models, can be used for simulation and prototyping. The Opj modeling language is su...
Rakesh Agarwal, Giorgio Bruno, Marco Torchiano
ICOODB
2010
171views Database» more  ICOODB 2010»
14 years 9 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...
CCS
2009
ACM
16 years 11 days ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
CIKM
2011
Springer
13 years 11 months ago
S3K: seeking statement-supporting top-K witnesses
Traditional information retrieval techniques based on keyword search help to identify a ranked set of relevant documents, which often contains many documents in the top ranks that...
Steffen Metzger, Shady Elbassuoni, Katja Hose, Ral...