7

Using UML to model relational database operations

Year:
2007
Language:
english
File:
PDF, 1.17 MB
english, 2007
15

An interoperable context sensitive model of trust

Year:
2009
Language:
english
File:
PDF, 538 KB
english, 2009
29

Towards a location-based mandatory access control model

Year:
2006
Language:
english
File:
PDF, 216 KB
english, 2006
30

An aspect-based approach to modeling access control concerns

Year:
2004
Language:
english
File:
PDF, 298 KB
english, 2004
32

A lattice-based approach for updating access control policies in real-time

Year:
2007
Language:
english
File:
PDF, 285 KB
english, 2007
34

Editors’ message for the special issue on security

Year:
2004
Language:
english
File:
PDF, 38 KB
english, 2004
35

On challenges of model transformation from UML to Alloy

Year:
2010
Language:
english
File:
PDF, 826 KB
english, 2010
36

Analysis of dependencies in advanced transaction models

Year:
2006
Language:
english
File:
PDF, 364 KB
english, 2006
38

Real-time update of access control policies

Year:
2004
Language:
english
File:
PDF, 414 KB
english, 2004
39

Utility driven optimization of real time data broadcast schedules

Year:
2012
Language:
english
File:
PDF, 939 KB
english, 2012
40

When does a workflow complete?

Year:
2011
Language:
english
File:
PDF, 573 KB
english, 2011
44

[Lecture Notes in Computer Science] Information Systems Security Volume 8303 ||

Year:
2013
Language:
english
File:
PDF, 9.74 MB
english, 2013
47

Enforcing spatio-temporal access control in mobile applications

Year:
2014
Language:
english
File:
PDF, 982 KB
english, 2014