Sciweavers

789 search results - page 131 / 158
» Pushing using Compliance
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
14 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
SACMAT
2011
ACM
14 years 10 days ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
SIGMOD
2011
ACM
242views Database» more  SIGMOD 2011»
14 years 10 days ago
The SystemT IDE: an integrated development environment for information extraction rules
Information Extraction (IE) — the problem of extracting structured information from unstructured text — has become the key enabler for many enterprise applications such as sem...
Laura Chiticariu, Vivian Chu, Sajib Dasgupta, Thil...
CGF
1998
213views more  CGF 1998»
14 years 9 months ago
Interactive Construction and Animation of Layered Elastically Deformable Characters
An interactive system is described for creating and animating deformable 3D characters. By using a hybrid layered model of kinematic and physics-based components together with an ...
Russell Turner, Enrico Gobbetti
162
Voted
VLDB
2009
ACM
147views Database» more  VLDB 2009»
15 years 9 months ago
Privacy-preserving indexing of documents on the network
We address the problem of providing privacypreserving search over distributed accesscontrolled content. Indexed documents can be easily reconstructed from conventional (inverted) ...
Mayank Bawa, Rakesh Agrawal, Roberto J. Bayardo Jr...