Sciweavers

708 search results - page 86 / 142
» Information system life cycle and management roles
Sort
View
WISA
2007
Springer
15 years 6 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
ETELEMED
2009
IEEE
164views Healthcare» more  ETELEMED 2009»
14 years 9 months ago
Research Challenges for Achieving Healthcare Business Process Interoperability
- E-Health systems' interoperability constitutes one of the main challenges of the IT society. E-Health interoperability will not occur without a shared policy and a process f...
Dimitrios Alexandrou, Gregoris Mentzas
SIGMOD
2011
ACM
169views Database» more  SIGMOD 2011»
14 years 2 months ago
Leveraging query logs for schema mapping generation in U-MAP
In this paper, we introduce U-MAP, a new system for schema mapping generation. U-MAP builds upon and extends existing schema mapping techniques. However, it mitigates some key pro...
Hazem Elmeleegy, Ahmed K. Elmagarmid, Jaewoo Lee
BTW
2005
Springer
142views Database» more  BTW 2005»
15 years 5 months ago
Self-Extending Peer Data Management
Abstract: Peer data management systems (PDMS) are the natural extension of integrated information systems. Conventionally, a single integrating system manages an integrated schema,...
Ralf Heese, Sven Herschel, Felix Naumann, Armin Ro...
VLDB
2008
ACM
148views Database» more  VLDB 2008»
16 years 2 days ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li