Sciweavers

1611 search results - page 218 / 323
» An Access Control Model for Video Database Systems
Sort
View
MODELLIERUNG
2008
14 years 11 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
IAT
2007
IEEE
15 years 4 months ago
TIBOR: A Resource-bounded Information Foraging Agent for Visual Analytics
Visual Analytics is the science of applying reasoning and analysis techniques to large, complex real-world data for problem solving using visualizations. Real world knowledge gath...
Dingxiang Liu, Anita Raja, Jayasri Vaidyanath
SSDBM
2000
IEEE
87views Database» more  SSDBM 2000»
15 years 2 months ago
A Tool for Nesting and Clustering Large Objects
In implementations of non-standard database systems, large objects are often embedded within an aggregate of different types, i.e. a tuple. For a given size and access probabilit...
Stefan Dieker, Ralf Hartmut Güting, Miguel Ro...
UM
2009
Springer
15 years 4 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
POLICY
2001
Springer
15 years 2 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...