Sciweavers

1611 search results - page 253 / 323
» An Access Control Model for Video Database Systems
Sort
View
ICDT
2009
ACM
248views Database» more  ICDT 2009»
15 years 10 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
ER
2008
Springer
136views Database» more  ER 2008»
14 years 11 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
ECEASST
2008
121views more  ECEASST 2008»
14 years 10 months ago
Analyzing Semantic Properties of OCL Operations by Uncovering Interoperational Relationships
The OCL (Object Constraint Language) as part of the UML (Unified Modeling Language) is a rich language with different collection kinds (sets, multi-sets, sequences) and a large var...
Mirco Kuhlmann, Martin Gogolla
WSE
2002
IEEE
15 years 2 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
WECWIS
2009
IEEE
198views ECommerce» more  WECWIS 2009»
15 years 4 months ago
Bridging the Gap between User Attributes and Service Policies with Attribute Mapping
—People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the...
Davide Cerri, Francesco Corcoglioniti