We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
For sentence compression, we propose new semantic constraints to directly capture the relations between a predicate and its arguments, whereas the existing approaches have focused...
Parse-tree paths are commonly used to incorporate information from syntactic parses into NLP systems. These systems typically treat the paths as atomic (or nearly atomic) features...
Information technology (IT) advances often create turmoil and disturb existing industry structures. We analyze the impact of the Internet and e-commerce technologies on digital int...
Nelson F. Granados, Robert J. Kauffman, Bradley Ki...