Sciweavers

977 search results - page 49 / 196
» Soft Constraints for Security
Sort
View
117
Voted
IVC
2006
227views more  IVC 2006»
15 years 1 months ago
Automatic registration of overlapping 3D point clouds using closest points
While the SoftAssign algorithm imposes a two-way constraint embedded into the deterministic annealing scheme and the EMICP algorithm imposes a one-way constraint, they represent t...
Yonghuai Liu
KES
2007
Springer
15 years 7 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
CSE
2009
IEEE
15 years 8 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings
IEEEARES
2006
IEEE
15 years 7 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
CIKM
2005
Springer
15 years 7 months ago
Access control for XML: a dynamic query rewriting approach
We introduce the notion of views as a mechanism for securing and providing access control in the context of XML. Research in XML has explored several efficient querying mechanism...
Sriram Mohan, Arijit Sengupta, Yuqing Wu