Sciweavers

261 search results - page 11 / 53
» Application domain independent policy conflict analysis usin...
Sort
View
81
Voted
CCS
2006
ACM
15 years 1 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
COLCOM
2009
IEEE
15 years 2 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
GIS
2007
ACM
15 years 10 months ago
A model for enriching trajectories with semantic geographical information
The collection of moving object data is becoming more and more common, and therefore there is an increasing need for the efficient analysis and knowledge extraction of these data ...
Alejandro A. Vaisman, Bart Kuijpers, Bart Moelans,...
EEE
2004
IEEE
15 years 1 months ago
Simulation Models and Their Metainfo-Management Using RDF-Based Paradigms
In a catalogue for computer-based models the basic problem is that complex interdependencies between models must be addressed, which are dependent on an application's domain....
Michael C. Jaeger, Moussa Lo, Robert J. Pefferly
ICIP
2009
IEEE
14 years 7 months ago
The direct use of curvelets in multifocus fusion
In this effort, a data-driven and application independent technique to combine focal information from different focal planes is presented. Input images, acquired by imaging system...
Harishwaran Hariharan, Andreas Koschan, Mongi A. A...