• Aucun résultat trouvé

[PDF] Top 20 Access Control for HTTP Operations on Linked Data

Has 10000 "Access Control for HTTP Operations on Linked Data" found on our website. Below are the top 20 most common "Access Control for HTTP Operations on Linked Data".

Access Control for HTTP Operations on Linked Data

Access Control for HTTP Operations on Linked Data

... the access conditions number on HTTP GET response time (Figure 5a and ...one access condi- tion, each including 5 ...of access conditions protecting the target RDF ...of access ... Voir le document complet

16

Connecting Distributed Version Control Systems Communities to Linked Open Data

Connecting Distributed Version Control Systems Communities to Linked Open Data

... standards. For instance, the Ontology Definition Meta Model (ODM) 6 is a standard of Object Management Group (OMG) to integrate ontology language into the software development process, the Open Services for ... Voir le document complet

10

SHI3LD: an Access Control Framework for the Mobile Web of Data

SHI3LD: an Access Control Framework for the Mobile Web of Data

... space for sharing textual documents into a medium for publishing structured ...uniform data model and on URIs to merge and identify structured data of heterogeneous ...The Linked ... Voir le document complet

3

Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores

Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores

... which linked data consumption takes place. Third, we combine the access control model and the contextual vocabulary into context-aware access conditions defined by data ... Voir le document complet

9

Access control policies and companies data transmission management

Access control policies and companies data transmission management

... problems for the company and the employees, especially in terms of credit, reputation and ...of data leakage can be detected more easily, because they are usually performed through overt ...(e.g. ... Voir le document complet

159

Context-aware access control and presentation of linked data

Context-aware access control and presentation of linked data

... presentation data selec- tion ...ontology for describing context conditions in a declarative style, compatible with Fresnel (by adopting the PRISSMA vocabulary described in Chapter 3), and ii) an ... Voir le document complet

145

Assisted Policy Management for SPARQL Endpoints Access Control

Assisted Policy Management for SPARQL Endpoints Access Control

... policies for the Shi3ld authorization ...also HTTP access to resources [3], we will ex- tend this application such that also poli- cies for Shi3ld-HTTP would be defined and manageable, ... Voir le document complet

5

An Access Control Model for Web Databases

An Access Control Model for Web Databases

... and for most of the web applications this is the user with very high ...have access to the same ...sensitive data, or use unauthorized functions. So, no more fine-grained access control ... Voir le document complet

9

Protecting sensitive data using differential privacy and role-based access control

Protecting sensitive data using differential privacy and role-based access control

... big data [27]. Although cloud has many benefits for their customers such as saving users’ money, ability to store more data compared to private servers, automatic updates, low cost, high scalability, ... Voir le document complet

102

Linked data based exploratory search

Linked data based exploratory search

... type. For instance "airport", "aircraft", "military conflict" or "weapon" are part of the "aircraft" ...use for describing other ...possible for the users to ... Voir le document complet

295

Data-driven optimization and analytics for operations management applications

Data-driven optimization and analytics for operations management applications

... A major part of daily operations of the gas utility is the maintenance of the large gas pipeline network. This entails executing two types of jobs: (i) standard jobs and (ii) emer- gency gas leak repair jobs. The ... Voir le document complet

166

The case for Access Control on XML relationships

The case for Access Control on XML relationships

... the access control policies of our motivating ...360 for a 50Knode, 100Knode and 150Knode document) since there is a single Name element in each ... Voir le document complet

24

Trusted Access Control System for Smart Campus

Trusted Access Control System for Smart Campus

... secure access control system based on TEE and IBE for university ...trusted access control architecture is then proposed based on a TEE cloud architecture relying on ...overall ... Voir le document complet

8

A Semi-Automatic Tool for Linked Data Integration

A Semi-Automatic Tool for Linked Data Integration

... questions, for instance: (i) what concepts contain the Name and Birth city columns? In this case, Name contains entities that are Persons (emperors) and Birth city contains entites that are Places ... Voir le document complet

5

Model-Based Tests for Access Control Policies

Model-Based Tests for Access Control Policies

... yields, for some strategies, tests with higher mutation scores than purely random ...testing for access control policies is a promising avenue of future ...possibilities for future ... Voir le document complet

11

A Linked Data Model for Facts, Statements and Beliefs

A Linked Data Model for Facts, Statements and Beliefs

... KEYWORDS Data journalism, linked data, fact-checking, tweet analysis 1 INTRODUCTION An interesting class of questions investigated in journalistic fact- checking is the analysis of who said what ... Voir le document complet

7

TcpHas: TCP for HTTP  Adaptive Streaming

TcpHas: TCP for HTTP Adaptive Streaming

... We use an ns-3 simulated HAS player similar to the emulated player described in [3], with a chunk duration of 2 seconds and a playback buffer of 30 seconds (maximum video size the buffer can hold). Note that [3] compares ... Voir le document complet

8

Data access for the 1,000 Plants (1KP) project

Data access for the 1,000 Plants (1KP) project

... our data (on a collaborative basis) to scientists who approached us with goals that did not compete with ...ours. For the general community, access was provided through a BLAST portal ... Voir le document complet

11

TcpHas: TCP for HTTP Adaptive Streaming

TcpHas: TCP for HTTP Adaptive Streaming

... methods for estimating the optimal quality level is that an efficient end-to-end estimator of available bandwidth can improve their performance, as shown in Subsection ...needed for shaping the HAS traffic ... Voir le document complet

8

Analysis of real time operations control strategies for Tren Urbano

Analysis of real time operations control strategies for Tren Urbano

... Station skipping strategies will not be included in the analysis given that Tren Urbano control decisions are unlikely to use these strategies given the structure [r] ... Voir le document complet

159

Show all 10000 documents...