Sciweavers

807 search results - page 34 / 162
» Term Rewriting for Access Control
Sort
View
SIGMOD
2007
ACM
124views Database» more  SIGMOD 2007»
16 years 2 months ago
Querying xml with update syntax
This paper investigates a class of transform queries proposed by XQuery Update [6]. A transform query is defined in terms of XML update syntax. When posed on an XML tree T, it ret...
Wenfei Fan, Gao Cong, Philip Bohannon
CISIS
2010
IEEE
15 years 8 months ago
Gene Ontology Rewritten for Computing Gene Functional Similarity
Abstract—Discovery biological organisation of the cell in modules network is a challenging task. Currently, approaches based on a controlled vocabulary, as Gene Ontology, to iden...
Alessia Visconti, Francesca Cordero, Marco Botta, ...
EUROSYS
2007
ACM
15 years 11 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
POLICY
2005
Springer
15 years 7 months ago
A RBAC-Based Policy Information Base
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based...
Timothy E. Squair, Edgard Jamhour, Ricardo Nabhen
105
Voted
ASAP
2005
IEEE
87views Hardware» more  ASAP 2005»
15 years 7 months ago
Expression Synthesis in Process Networks generated by LAURA
The COMPAAN/LAURA [18] tool chain maps nested loop applications written in Matlab onto reconfigurable platforms, such as FPGAs. COMPAAN rewrites the original Matlab application a...
Claudiu Zissulescu, Bart Kienhuis, Ed F. Depretter...