Sciweavers

948 search results - page 137 / 190
» Analysis of SITA policies
Sort
View
CSFW
2006
IEEE
15 years 6 months ago
On Key Assignment for Hierarchical Access Control
A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key ...
Jason Crampton, Keith M. Martin, Peter R. Wild
VLDB
2004
ACM
113views Database» more  VLDB 2004»
15 years 5 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
ECOOPW
1998
Springer
15 years 4 months ago
Workshop Report - ECOOP'98 Workshop 7: Tools and Environments for Business Rules
This workshop focussed on the requirements for tools and environments that support business rules in an object-oriented setting and attempted to provide an overview of possible tec...
Kim Mens, Roel Wuyts, Dirk Bontridder, Alain Grijs...
PODC
1994
ACM
15 years 4 months ago
A Performance Evaluation of Lock-Free Synchronization Protocols
In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Anthony LaMarca
ER
2009
Springer
316views Database» more  ER 2009»
15 years 3 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....