Sciweavers

376 search results - page 25 / 76
» Integrity constraints in trust management
Sort
View
EUC
2007
Springer
15 years 8 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
DBKDA
2009
IEEE
136views Database» more  DBKDA 2009»
15 years 5 months ago
Visualization and Integration of Databases Using Self-Organizing Map
Abstract--With the growing computer networks, accessible data is becoming increasing distributed. Understanding and integrating remote and unfamiliar data sources are important dat...
Farid Bourennani, Ken Q. Pu, Ying Zhu
ECBS
1999
IEEE
112views Hardware» more  ECBS 1999»
15 years 6 months ago
Metaprogrammable Toolkit for Model-Integrated Computing
Model-Integrated Computing, specifically Model-Integrated Program Synthesis (MIPS) environments that include visual model building, constraint management, and automatic program sy...
Ákos Lédeczi, Miklos Maroti, Gabor K...
POLICY
2005
Springer
15 years 7 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
WECWIS
2009
IEEE
177views ECommerce» more  WECWIS 2009»
15 years 8 months ago
Business Rules for Concurrent E-commerce Transactions
Business rules are a cornerstone of the consistency management of e-commerce data. The concurrency of transactions by multiple customers of e-commerce services (e.g., seat reserva...
Hendrik Decker