Sciweavers

2061 search results - page 170 / 413
» Authorization for Metacomputing Applications
Sort
View
SACMAT
2003
ACM
15 years 9 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
CIKM
2008
Springer
15 years 6 months ago
Scalable community discovery on textual data with relations
Every piece of textual data is generated as a method to convey its authors' opinion regarding specific topics. Authors deliberately organize their writings and create links, ...
Huajing Li, Zaiqing Nie, Wang-Chien Lee, C. Lee Gi...
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
15 years 6 months ago
Meta Analysis within Authorship Verification
In an authorship verification problem one is given writing examples from an author A, and one is asked to determine whether or not each text in fact was written by A. In a more ge...
Benno Stein, Nedim Lipka, Sven Meyer zu Eissen
ACL
2006
15 years 5 months ago
Automatic Classification of Verbs in Biomedical Texts
away concepts from the surface form of the text. The authors argue that while there has been research into automatic classification, general classification schemes are unsuitable f...
Anna Korhonen, Yuval Krymolowski, Nigel Collier
DBSEC
2003
155views Database» more  DBSEC 2003»
15 years 5 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu