Sciweavers

1611 search results - page 201 / 323
» An Access Control Model for Video Database Systems
Sort
View
WSC
1998
14 years 11 months ago
Enterprise Architecture for Business Process Simulation
Many simulation systems are standalone, running only on a desktop and having limited capabilities to integrate with other technologies such as company databases, workflow engines,...
Ali Bahrami, Deborah A. Sadowski, Soheila Bahrami
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
15 years 4 months ago
Identification of the payload inertial parameters of industrial manipulators
— In this paper we present four methods for the identification of the inertial parameters of the load of a manipulator. The knowledge of the values of these parameters can be use...
Wisama Khalil, Maxime Gautier, Philippe Lemoine
SIS
2007
14 years 11 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
SOUPS
2009
ACM
15 years 4 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
DBSEC
2003
155views Database» more  DBSEC 2003»
14 years 11 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu