Sciweavers

445 search results - page 30 / 89
» Authorization and Access Control in IRO-DB
Sort
View
CCS
2010
ACM
15 years 4 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
DSS
2006
140views more  DSS 2006»
14 years 9 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
84
Voted
PCM
2004
Springer
121views Multimedia» more  PCM 2004»
15 years 3 months ago
A Java-Based Collaborative Authoring System for Multimedia Presentation
Abstract. In this paper, we propose a Java-based collaborative authoring system for multimedia presentation. Our system is composed of an Editing System, a Media Object Manager and...
Mee Young Sung, Do Hyung Lee
SIS
2004
14 years 11 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
ACSAC
2003
IEEE
15 years 3 months ago
Usable Access Control for the World Wide Web
While publishing content on the World Wide Web has moved within reach of the non-technical mainstream, controlling access to published content still requires expertise in Web serv...
Dirk Balfanz