Sciweavers

386 search results - page 70 / 78
» acl 2006
Sort
View
CSFW
2006
IEEE
15 years 4 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi
ACOM
2006
Springer
15 years 4 months ago
Adaptiveness in Agent Communication: Application and Adaptation of Conversation Patterns
Communication in multi-agent systems (MASs) is usually governed by agent communication languages (ACLs) and communication protocols carrying a clear cut semantics. With an increasi...
Felix A. Fischer, Michael Rovatsos, Gerhard Wei&sz...
SAC
2006
ACM
15 years 4 months ago
Simplifying transformation of software architecture constraints
The heterogeneity of architectural constraint languages makes difficult the transformation of architectural constraints throughout the development process. Indeed they have signiï...
Chouki Tibermacine, Régis Fleurquin, Salah ...
DBSEC
2006
122views Database» more  DBSEC 2006»
14 years 11 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
EACL
2006
ACL Anthology
14 years 11 months ago
Generating and Visualizing a Soccer Knowledge Base
o abstract describes the SmartWeb Ontology-based Annotation system (SOBA). A key feature of SOBA is that all information is extracted and stored with respect to the SmartWeb Integ...
Paul Buitelaar, Thomas Eigner, Greg Gul-rajani, Al...