Sciweavers

433 search results - page 62 / 87
» Using Description Logics in Relation Based Access Control
Sort
View
ER
2010
Springer
129views Database» more  ER 2010»
14 years 7 months ago
SQOWL: Type Inference in an RDBMS
In this paper we describe a method to perform type inference over data stored in an RDBMS, where rules over the data are specified using OWLDL. Since OWL-DL is an implementation of...
Peter McBrien, Nikos Rizopoulos, Andrew Smith
DLOG
2003
14 years 11 months ago
Wine Agent: Semantic Web Testbed Application
The Wine Agent is a demonstration system that uses an underlying domain ontology to provide suitable wines for a given meal. In doing so it serves as a testbed, not only for the l...
Eric I. Hsu, Deborah L. McGuinness
WWW
2006
ACM
15 years 10 months ago
Model-based version and configuration management for a web engineering lifecycle
During a lifecycle of a large-scale Web application, Web developers produce a wide variety of inter-related Web objects. Following good Web engineering practice, developers often ...
Tien Nhut Nguyen
ESORICS
2000
Springer
15 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
DBSEC
2009
122views Database» more  DBSEC 2009»
14 years 10 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald