Sciweavers

1030 search results - page 117 / 206
» Happenings
Sort
View
DEON
2008
Springer
15 years 1 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
ER
2008
Springer
110views Database» more  ER 2008»
15 years 1 months ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi
ESWS
2008
Springer
15 years 1 months ago
On Storage Policies for Semantic Web Repositories That Support Versioning
This paper concerns versioning services over Semantic Web (SW) repositories. We propose a novel storage index (based on partial orders), called POI, that exploits the fact that RDF...
Yannis Tzitzikas, Yannis Theoharis, Dimitris Andre...
INFOSCALE
2007
ACM
15 years 23 days ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
AVI
2010
15 years 20 days ago
Showtime: increasing viewer understanding of dynamic network visualisations
Visualisations of dynamic networks are animated over time, reflecting changes in the underlying data structure. As viewers of these visualisations, it is up to us to accurately pe...
Ross Shannon, Aaron J. Quigley, Paddy Nixon