Sciweavers

376 search results - page 22 / 76
» Integrity constraints in trust management
Sort
View
DISCEX
2003
IEEE
15 years 7 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
ICWS
2004
IEEE
15 years 3 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
VLDB
1990
ACM
61views Database» more  VLDB 1990»
15 years 6 months ago
Referential Integrity Revisited: An Object-Oriented Perspective
Referential integrity underlies the relational representation of objeceoriented structures. The concept of referential integrity in relational databases is hindered by the confusi...
Victor M. Markowitz
IJCAI
2001
15 years 3 months ago
Refining the Basic Constraint Propagation Algorithm
Constraint propagation is the main feature of any constraint solver. This is thus of prime importance to manage constraint propagation as efficiently as possible, justifying the us...
Christian Bessière, Jean-Charles Rég...
SAC
2009
ACM
15 years 6 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...