Sciweavers

3793 search results - page 676 / 759
» Expressive Description Logics
Sort
View
ESORICS
2007
Springer
15 years 4 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
HYBRID
2007
Springer
15 years 4 months ago
Model Checking Genetic Regulatory Networks with Parameter Uncertainty
The lack of precise numerical information for the values of biological parameters severely limits the development and analysis of models of genetic regulatory networks. To deal wit...
Grégory Batt, Calin Belta, Ron Weiss
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 4 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
OTM
2007
Springer
15 years 4 months ago
Policy-Based Service Registration and Discovery
The WS-Policy framework has been introduced to allow policy to be expressed and associated with Web Services thereby enabling organizations to manage the quality of their services...
Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringe...
ICNP
2006
IEEE
15 years 4 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...