Sciweavers

805 search results - page 7 / 161
» On the Role of Integrity Constraints in Data Integration
Sort
View
COMSWARE
2007
IEEE
15 years 3 months ago
Role Based Access Control for UDDI Inquiries
— Web Services are commonly used by organizations for B2B integration and enterprise application integration. UDDI registries are widely used as mechanisms for businesses to list...
Raymond Peterkin, Jinsuk Solomon, Dan Ionescu
DILS
2008
Springer
14 years 11 months ago
Ontologies and Data Integration in Biomedicine: Success Stories and Challenging Issues
In this presentation, we review some examples of successful biomedical data integration projects in which ontologies play an important role, including the integration of genomic da...
Olivier Bodenreider
SACMAT
2003
ACM
15 years 2 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ICWS
2008
IEEE
14 years 11 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
DBPL
2003
Springer
105views Database» more  DBPL 2003»
15 years 2 months ago
Integrating Database and Programming Language Constraints
Abstract. We examine the maintenance of data consistency in the presence of application-database interactions. Currently, a programmer must insert explicit checks to ensure that da...
Oded Shmueli, Mukund Raghavachari, Vivek Sarkar, R...