Sciweavers

23 search results - page 4 / 5
» Acoustic Modeling of Dialogue Elements for Document Accessib...
Sort
View
WEBDB
2004
Springer
122views Database» more  WEBDB 2004»
13 years 11 months ago
Querying Bi-level Information
In our research on superimposed information management, we have developed applications where information elements in the superimposed layer serve to annotate, comment, restructure...
Sudarshan Murthy, David Maier, Lois M. L. Delcambr...
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 7 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
GCC
2003
Springer
13 years 11 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
CCS
2004
ACM
13 years 11 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 7 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...